lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20160608.224200.1252447699887026317.davem@davemloft.net> Date: Wed, 08 Jun 2016 22:42:00 -0700 (PDT) From: David Miller <davem@...emloft.net> To: fw@...len.de Cc: netdev@...r.kernel.org Subject: Re: [PATCH v2 net] qfq: don't leak skb if kzalloc fails From: Florian Westphal <fw@...len.de> Date: Wed, 8 Jun 2016 23:23:01 +0200 > When we need to create a new aggregate to enqueue the skb we call kzalloc. > If that fails we returned ENOBUFS without freeing the skb. > > Spotted during code review. > > Signed-off-by: Florian Westphal <fw@...len.de> Applied.
Powered by blists - more mailing lists