Re: [PATCH] net: Avoid address overwrite in kernel_connect

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> Nit, next time use more sha1 characters, the kernel documentation shows
how many we usually rely on.

Ack. I'll keep this in mind next time.

> Why not also 4.14?
The BPF hooks that lead to this problem were introduced after 4.14 in
this upstream commit (d74bad4e74ee373787a9ae24197c17b7cdc428d5). 4.19
is the earliest supported kernel version in which this bug appears.

Thanks,
Jordan

On Thu, Sep 7, 2023 at 4:27 AM Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx> wrote:
>
> On Tue, Sep 05, 2023 at 06:58:46PM -0500, Jordan Rife wrote:
> > commit 0bdf399 upstream.
>
> Nit, next time use more sha1 characters, the kernel documentation shows
> how many we usually rely on.
>
> > This fix applies to all stable kernel versions 4.19+.
>
> Why not also 4.14?
>
> Anyway, now queued up, thanks.
>
> greg k-h




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux