lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20231221172956.GE1056991@kernel.org> Date: Thu, 21 Dec 2023 18:29:56 +0100 From: Simon Horman <horms@...nel.org> To: Hangyu Hua <hbh25y@...il.com> Cc: jhs@...atatu.com, xiyou.wangcong@...il.com, jiri@...nulli.us, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, tgraf@...g.ch, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v2] net: sched: em_text: fix possible memory leak in em_text_destroy() On Thu, Dec 21, 2023 at 10:25:31AM +0800, Hangyu Hua wrote: > m->data needs to be freed when em_text_destroy is called. > > Fixes: d675c989ed2d ("[PKT_SCHED]: Packet classification based on textsearch (ematch)") > Acked-by: Jamal Hadi Salim <jhs@...atatu.com> > Signed-off-by: Hangyu Hua <hbh25y@...il.com> Reviewed-by: Simon Horman <horms@...nel.org>
Powered by blists - more mailing lists