lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 13 Jun 2022 09:25:50 -0700 From: Kees Cook <keescook@...omium.org> To: willy@...radead.org Cc: Kees Cook <keescook@...omium.org>, linux-mm@...ck.org, urezki@...il.com, linux-xfs@...r.kernel.org, linux-hardening@...r.kernel.org, zlang@...hat.com Subject: Re: [PATCH 0/3] Fixes for usercopy On Sun, 12 Jun 2022 22:32:24 +0100, Matthew Wilcox (Oracle) wrote: > Kees, I'm hoping you'll take these through your tree. I think they're > all reasonable fixes to go into 5.19. The first one is essential; > it fixes two different bugs that people have hit. > > Matthew Wilcox (Oracle) (3): > usercopy: Handle vm_map_ram() areas > usercopy: Cast pointer to an integer once > usercopy: Make usercopy resilient against ridiculously large copies > > [...] Applied to for-next/hardening, thanks! [1/3] usercopy: Handle vm_map_ram() areas https://git.kernel.org/kees/c/751ad8bdde7f [2/3] usercopy: Cast pointer to an integer once https://git.kernel.org/kees/c/de2ae8f5331a [3/3] usercopy: Make usercopy resilient against ridiculously large copies https://git.kernel.org/kees/c/630b2014e60e -- Kees Cook
Powered by blists - more mailing lists