lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 14 May 2019 17:14:34 +0100
From:   Daniel Thompson <daniel.thompson@...aro.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Jason Wessel <jason.wessel@...driver.com>,
        linux-kernel@...r.kernel.org,
        Wenlin Kang <wenlin.kang@...driver.com>,
        Dan Carpenter <dan.carpenter@...cle.com>,
        Douglas Anderson <dianders@...omium.org>,
        Young Xiao <YangX92@...mail.com>,
        "Gustavo A. R. Silva" <gustavo@...eddedor.com>
Subject: [GIT PULL] kgdb changes v5.2-rc1

The following changes since commit dc4060a5dc2557e6b5aa813bf5b73677299d62d2:

  Linux 5.1-rc5 (2019-04-14 15:17:41 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/danielt/linux.git/ tags/kgdb-5.2-rc1

for you to fetch changes up to ca976bfb3154c7bc67c4651ecd144fdf67ccaee7:

  kdb: Fix bound check compiler warning (2019-05-14 13:44:24 +0100)

----------------------------------------------------------------
kgdb patches for 5.2-rc1

Mostly clean ups but there are also a couple of out-of-bounds accesses
(including a potential write to the byte before a static buffer).

The main changes are:

 * Fixes those out-of-bounds access (empty string to configure
   test module could write the byte before a buffer, high cpu counts
   could read outside of per-cpu structures).

 * Improvements to string handling problems picked up by new compiler
   warnings and other static checks. Most are fixing benign issues that
   can't be tickled without code changes but still reduce the wtf factor
   a little.

 * Tidy up the terminal output.

Signed-off-by: Daniel Thompson <daniel.thompson@...aro.org>

----------------------------------------------------------------
Dan Carpenter (1):
      kdb: do a sanity check on the cpu in kdb_per_cpu()

Douglas Anderson (1):
      kdb: Get rid of broken attempt to print CCVERSION in kdb summary

Gustavo A. R. Silva (3):
      gdbstub: mark expected switch fall-throughs
      gdbstub: Replace strcpy() by strscpy()
      kdb: kdb_support: replace strcpy() by strscpy()

Wenlin Kang (1):
      kdb: Fix bound check compiler warning

Young Xiao (1):
      misc: kgdbts: fix out-of-bounds access in function param_set_kgdbts_var

 drivers/misc/kgdbts.c          | 4 ++--
 kernel/debug/gdbstub.c         | 9 +++++----
 kernel/debug/kdb/Makefile      | 1 -
 kernel/debug/kdb/kdb_io.c      | 2 +-
 kernel/debug/kdb/kdb_main.c    | 3 +--
 kernel/debug/kdb/kdb_support.c | 2 +-
 6 files changed, 10 insertions(+), 11 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ