lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Thu, 16 Aug 2018 16:54:57 -0700
From:   Kees Cook <keescook@...omium.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, Arnd Bergmann <arnd@...db.de>,
        Shawn Guo <shawnguo@...nel.org>
Subject: [GIT PULL] VLA removal leftovers for v4.19-rc1

Hi Linus,

Please pull these two VLA removals for v4.19-rc1. It didn't seem
sensible to me to wait to add these: they're both trivial and have been
sitting in -next while I tried to get them picked up by their respective
maintainers. Instead, I can just be that maintainer. :) After these,
only some core crypto VLA removals remain, as the series that fixes them
is still under review.

Thanks!

-Kees

The following changes since commit 7daf201d7fe8334e2d2364d4e8ed3394ec9af819:

  Linux 4.18-rc2 (2018-06-24 20:54:29 +0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/vla-leftovers-v4.19-rc1

for you to fetch changes up to d8dfa59f5a512a536b80a4a8f12fa993683f48df:

  bus: imx-weim: Remove VLA usage (2018-08-13 13:40:52 -0700)

----------------------------------------------------------------
VLA leftovers pull summary:

- bus/imx-weim: Use maximum register count to avoid VLA

- drm/i2c/tda9950: Use maximum CEC message size to avoid VLA

----------------------------------------------------------------
Kees Cook (2):
      drm/i2c: tda9950: Remove VLA usage
      bus: imx-weim: Remove VLA usage

 drivers/bus/imx-weim.c        | 7 ++++++-
 drivers/gpu/drm/i2c/tda9950.c | 5 ++++-
 2 files changed, 10 insertions(+), 2 deletions(-)

-- 
Kees Cook
Pixel Security

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ