[PATCH] ring: fix overflow in memory size calcuation

David Marchand david.marchand at redhat.com
Sat Feb 5 18:21:29 CET 2022


On Tue, Dec 14, 2021 at 4:30 AM Zhihong Wang
<wangzhihong.wzh at bytedance.com> wrote:
>
> Parameters count and esize are both unsigned int, and their product can
> legally exceed unsigned int and lead to runtime access violation.
>
> Fixes: cc4b218790f6 ("ring: support configurable element size")
> Cc: stable at dpdk.org
>
> Signed-off-by: Zhihong Wang <wangzhihong.wzh at bytedance.com>

Reviewed-by: Liang Ma <liangma at liangbit.com>
Reviewed-by: Morten Brørup <mb at smartsharesystems.com>
Acked-by: Konstantin Ananyev <konstantin.ananyev at intel.com>

Applied, thanks.


-- 
David Marchand



More information about the stable mailing list