lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20231013171712.0817d810@kernel.org> Date: Fri, 13 Oct 2023 17:17:12 -0700 From: Jakub Kicinski <kuba@...nel.org> To: Ma Ke <make_ruc2021@....com> Cc: jmaloy@...hat.com, ying.xue@...driver.com, davem@...emloft.net, edumazet@...gle.com, pabeni@...hat.com, netdev@...r.kernel.org, tipc-discussion@...ts.sourceforge.net, linux-kernel@...r.kernel.org Subject: Re: [PATCH] tipc: Fix uninit-value access in tipc_nl_node_get_link() On Fri, 13 Oct 2023 15:04:08 +0800 Ma Ke wrote: > Names must be null-terminated strings. If a name which is not > null-terminated is passed through netlink, strstr() and similar > functions can cause buffer overrun. This patch fixes this issue > by returning -EINVAL if a non-null-terminated name is passed. > > Signed-off-by: Ma Ke <make_ruc2021@....com> You have now sent 14 incorrect fixes to Linux networking. And not a single correct one. I would like to politely ask you to stop.
Powered by blists - more mailing lists