On Thu, Jan 31, 2013 at 3:02 AM, James Morris wrote:
> What's the practical impact of this? Could an attacker kill the machine?
>
>
It might be possible slowly to eat the whole memory if there were too
many memory verifications.
This is a bug and the patch will be applied to stable.
Should go to
What's the practical impact of this? Could an attacker kill the machine?
On Wed, 30 Jan 2013, Kasatkin, Dmitry wrote:
> On Fri, Jan 25, 2013 at 4:54 PM, Dmitry Kasatkin
> wrote:
> > From: YOSHIFUJI Hideaki
> >
> > digsig_verify_rsa() does not free kmalloc'ed buffer returned by
> > mpi_get_buf
On Fri, Jan 25, 2013 at 4:54 PM, Dmitry Kasatkin
wrote:
> From: YOSHIFUJI Hideaki
>
> digsig_verify_rsa() does not free kmalloc'ed buffer returned by
> mpi_get_buffer().
>
> Signed-off-by: YOSHIFUJI Hideaki
> Signed-off-by: Dmitry Kasatkin
> Cc: sta...@vger.kernel.org
> ---
> lib/digsig.c |
From: YOSHIFUJI Hideaki
digsig_verify_rsa() does not free kmalloc'ed buffer returned by
mpi_get_buffer().
Signed-off-by: YOSHIFUJI Hideaki
Signed-off-by: Dmitry Kasatkin
Cc: sta...@vger.kernel.org
---
lib/digsig.c |2 ++
1 file changed, 2 insertions(+)
diff --git a/lib/digsig.c b/lib/dig
4 matches
Mail list logo