lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 10 Dec 2007 20:57:28 +0100 From: Andi Kleen <ak@...e.de> To: Sam Ravnborg <sam@...nborg.org> Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org, rusty@...tcorp.com.au Subject: Re: [PATCH RFC] [5/9] modpost: Fix a buffer overflow in modpost On Monday 10 December 2007 20:32, Sam Ravnborg wrote: > On Thu, Nov 22, 2007 at 03:43:10AM +0100, Andi Kleen wrote: > > When passing an file name > 1k the stack could be overflowed. > > Not really a security issue, but still better plugged. > > Looks good. A s-o-b line again please. Signed-off-by: Andi Kleen <ak@...e.de> > Although I am not so happy with the ue of gcc extensions. That's not a gcc extension. It's C99. -Andi -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists