lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 08 Mar 2007 23:29:08 -0800 (PST) From: David Miller <davem@...emloft.net> To: amit2030@...il.com Cc: linux-kernel@...r.kernel.org, akpm@...l.org, netdev@...r.kernel.org Subject: Re: [PATCH] [REVISED] net/ipv4/multipath_wrandom.c: check kmalloc() return value. From: Amit Choudhary <amit2030@...il.com> Date: Thu, 8 Mar 2007 23:22:15 -0800 > Description: Check the return value of kmalloc() in function wrandom_set_nhinfo(), in file net/ipv4/multipath_wrandom.c. > > Signed-off-by: Amit Choudhary <amit2030@...il.com> This kind of patch has been submitted several times before and it's never accepted because you have to do much more than this to recover from the allocation error. There is no error status returned to the caller, so the callers assume the operation succeeded, and will either OOPS or crash in some other way. Therefore, just adding some NULL pointer checks and returning is not going to fix this bug. The whole cahce-multipath subsystem has to have it's guts revamped for proper error handling. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists