lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20121213220402.GH9713@sli.dy.fi>
Date:	Fri, 14 Dec 2012 00:04:02 +0200
From:	Sami Liedes <sami.liedes@....fi>
To:	linux-ext4@...r.kernel.org
Subject: [PATCH 0/8] e2fsprogs: Fix various cases of undefined behavior

This set of patches fixes a number of issues causing undefined
behavior.  These were caught by running the test suite after
compiling e2fsprogs with the Clang compiler and -fsanitize=undefined.

Sami Liedes (8):
  lib/blkid/list.h: Fix undefined behavior in list_entry() macro
  lib/ext2fs/rbtree.h: Fix container_of() undefined behavior
  e2fsck/pass1.c: Fix undefined behavior in check_blocks()
  lib/ext2fs/block.c: Fix undefined behavior in block_iterate_tind()
  e2fsck/revoke.c: Fix undefined behavior in hash()
  lib/ext2fs/kernel-list.h: Fix undefined behavior in list_entry()
    macro
  lib/ext2fs/qcow2.h: Fix #defined 1<<63 values to be unsigned.
  e2fsck/jfs_user.h: Fix b_data alignment in struct buffer_head

 e2fsck/jfs_user.h        |    2 +-
 e2fsck/pass1.c           |    2 +-
 e2fsck/revoke.c          |    2 +-
 lib/blkid/list.h         |    5 +++--
 lib/ext2fs/block.c       |    2 +-
 lib/ext2fs/kernel-list.h |    6 ++++--
 lib/ext2fs/qcow2.h       |    4 ++--
 lib/ext2fs/rbtree.h      |    2 ++
 misc/e2image.c           |    2 +-
 9 files changed, 16 insertions(+), 11 deletions(-)

-- 
1.7.10.4
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ