[PATCH] ring: fix overflow in memory size calcuation
    David Marchand 
    david.marchand at redhat.com
       
    Sat Feb  5 18:21:29 CET 2022
    
    
  
On Tue, Dec 14, 2021 at 4:30 AM Zhihong Wang
<wangzhihong.wzh at bytedance.com> wrote:
>
> Parameters count and esize are both unsigned int, and their product can
> legally exceed unsigned int and lead to runtime access violation.
>
> Fixes: cc4b218790f6 ("ring: support configurable element size")
> Cc: stable at dpdk.org
>
> Signed-off-by: Zhihong Wang <wangzhihong.wzh at bytedance.com>
Reviewed-by: Liang Ma <liangma at liangbit.com>
Reviewed-by: Morten Brørup <mb at smartsharesystems.com>
Acked-by: Konstantin Ananyev <konstantin.ananyev at intel.com>
Applied, thanks.
-- 
David Marchand
    
    
More information about the dev
mailing list