Re: [PATCH net-next v4] sctp: fix a potential OOB access in sctp_sched_set_sched()

From: patchwork-bot+netdevbpf
Date: Wed May 10 2023 - 07:20:31 EST


Hello:

This patch was applied to netdev/net-next.git (main)
by David S. Miller <davem@xxxxxxxxxxxxx>:

On Wed, 10 May 2023 09:23:40 +0000 you wrote:
> From: "Ilia.Gavrilov" <Ilia.Gavrilov@xxxxxxxxxxx>
>
> The 'sched' index value must be checked before accessing an element
> of the 'sctp_sched_ops' array. Otherwise, it can lead to OOB access.
>
> Note that it's harmless since the 'sched' parameter is checked before
> calling 'sctp_sched_set_sched'.
>
> [...]

Here is the summary with links:
- [net-next,v4] sctp: fix a potential OOB access in sctp_sched_set_sched()
https://git.kernel.org/netdev/net-next/c/059fa492027e

You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html