This is the mail archive of the
libc-alpha@sourceware.org
mailing list for the glibc project.
Re: [PATCH v3] [BZ #15857] malloc: Check for integer overflow in memalign.
- From: Siddhesh Poyarekar <siddhesh dot poyarekar at gmail dot com>
- To: Will Newton <will dot newton at linaro dot org>
- Cc: GNU C Library <libc-alpha at sourceware dot org>, Patch Tracking <patches at linaro dot org>, David Miller <davem at davemloft dot net>
- Date: Wed, 11 Sep 2013 15:48:53 +0530
- Subject: Re: [PATCH v3] [BZ #15857] malloc: Check for integer overflow in memalign.
- Authentication-results: sourceware.org; auth=none
- References: <522F1BA7 dot 7070102 at linaro dot org> <CAAHN_R0gdT6M=gq=yTWV5xZ47eEu1iDRQXMKK1sKNk_i-PEVaA at mail dot gmail dot com> <CANu=Dmh4QkKogpXHO0P2YN2szLhQuyVz+UnYGzgcbpj+ODKKOw at mail dot gmail dot com>
On 11 September 2013 15:32, Will Newton <will.newton@linaro.org> wrote:
> These patches should also apply cleanly to 2.18, should I cherry pick
> them there too?
David owns 2.18, so he can take that call.
> Also I am not sure if it is worth allocating a CVE number for these
> issues - pvalloc and valloc seem very rarely used but memalign and
> posix_memalign are more common.
It would be useful to allocate a CVE number. The fact that pvalloc
and valloc are rarely used doesn't matter in this decision - it
matters when evaluating the impact of the bug.
Siddhesh
--
http://siddhesh.in