lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20180319.123300.313014421741825604.davem@davemloft.net>
Date:   Mon, 19 Mar 2018 12:33:00 -0400 (EDT)
From:   David Miller <davem@...emloft.net>
To:     holger@...lied-asynchrony.com
Cc:     carlos@...ica.ufpr.br, soheil@...gle.com,
        gregkh@...uxfoundation.org, netdev@...r.kernel.org,
        stable@...r.kernel.org
Subject: Re: NULL pointer dereferences with 4.14.27

From: Holger Hoffstätte <holger@...lied-asynchrony.com>
Date: Mon, 19 Mar 2018 16:57:48 +0100

> This patch is in the netdev patchwork at https://patchwork.ozlabs.org/patch/886324/
> but has been marked as "not applicable" without further queued/rejected comment
> from Dave, so I believe it became a victim of email lossage.

It is not a victim of email lossage.

When someone posts a backport for -stable, that is not intended to be
applied upstream (because it's already there), I add the patch to the
stable bundle and mark it as "Not applicable" because it's "Not
applicable" for upstream.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ