lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20071106233448.GM8181@ftp.linux.org.uk>
Date:	Tue, 6 Nov 2007 23:34:48 +0000
From:	Al Viro <viro@....linux.org.uk>
To:	Roel Kluin <12o3l@...cali.nl>
Cc:	lkml <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] fix writing to unintended memory in pkt_generic_packet(); drivers/block/pktcdvd.c

On Wed, Nov 07, 2007 at 12:14:48AM +0100, Roel Kluin wrote:
> Al Viro wrote:
> > On Tue, Nov 06, 2007 at 11:43:12PM +0100, Roel Kluin wrote:
> >> CDROM_PACKET_SIZE is added as an offset to the pointer to unsigned char cmd[16].
> >> The adjusted pointer is then used as a destination address in a call to
> >> memset(). However, when CDROM_PACKET_SIZE is added to the pointer, it is
> >> automatically scaled by the size of cmd, which is 16. This results in the call
> >> to memset() writing to unintended memory.
> > 
> > What are you talking about?  rq->cmd is an array, not a pointer to array.
> > When it occurs as an argument of +, it decays to pointer to array element.
> 
> Ok, I misunderstood, but please...
> 
> > Please, learn C.
> 
> That's not a nice thing to say.

Excuse me, but if you want to write in C, you will have to learn the language.
Really.  Including the relationship between pointers and arrays.  No way
around it, it's really basic stuff.  Whether it's a nice thing to say or not,
it is true and I do not know more polite way to phrase that.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ