lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 18 May 2020 09:00:52 -0400 From: Jamal Hadi Salim <jhs@...atatu.com> To: stephen@...workplumber.org Cc: netdev@...r.kernel.org, dsahern@...il.com, aclaudi@...hat.com, daniel@...earbox.net, asmadeus@...ewreck.org Subject: Re: [PATCH iproute2 v3 0/2] bpf: memory access fixes ping? Note: these are trivial bug fixes. cheers, jamal On 2020-04-28 12:15 p.m., Jamal Hadi Salim wrote: > Stephen, > What happened to this? > > cheers, > jamal > > On 2020-04-23 1:58 p.m., Jamal Hadi Salim wrote: >> From: Jamal Hadi Salim <jhs@...atatu.com> >> >> Changes from V2: >> 1) Dont initialize tmp on stack (Stephen) >> 2) Dont look at the return code of snprintf (Dominique) >> 3) Set errno to EINVAL instead of returning -EINVAL for consistency >> (Dominique) >> >> Changes from V1: >> 1) use snprintf instead of sprintf and fix corresponding error message. >> Caught-by: Dominique Martinet <asmadeus@...ewreck.org> >> 2) Fix memory leak and extraneous free() in error path >> >> Jamal Hadi Salim (2): >> bpf: Fix segfault when custom pinning is used >> bpf: Fix mem leak and extraneous free() in error path >> >> lib/bpf.c | 17 +++++++---------- >> 1 file changed, 7 insertions(+), 10 deletions(-) >> >
Powered by blists - more mailing lists