lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 11 Oct 2022 08:59:49 +0200 From: Johannes Berg <johannes@...solutions.net> To: Kees Cook <keescook@...omium.org>, kernel test robot <yujie.liu@...el.com> Cc: lkp@...ts.01.org, lkp@...el.com, linux-kernel@...r.kernel.org, linux-hardening@...r.kernel.org, "Gustavo A. R. Silva" <gustavoars@...nel.org>, Hawkins Jiawei <yin31149@...il.com>, linux-wireless@...r.kernel.org Subject: Re: [fortify] 54d9469bc5: WARNING:at_net/wireless/wext-core.c:#wireless_send_event On Mon, 2022-10-10 at 23:17 -0700, Kees Cook wrote: > On Tue, Oct 11, 2022 at 11:46:21AM +0800, kernel test robot wrote: > > commit: 54d9469bc515dc5fcbc20eecbe19cea868b70d68 ("fortify: Add run-time WARN for cross-field memcpy()") > > https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master > > [...] > > caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): > > [...] > > [ 95.913726][ T36] memcpy: detected field-spanning write (size 16) of single field "&compat_event->pointer" at net/wireless/wext-core.c:623 (size 4) > > This was fixed with: > e3e6e1d16a4c ("wifi: wext: use flex array destination for memcpy()") > > I expect this will land before -rc1 closes, but Johannes will know more > about the schedule. > Yes, we're planning to send a pull request today, so that should go to Linus with the net pull request tomorrow. johannes
Powered by blists - more mailing lists