[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220627110417.27648-1-xyangxi5@gmail.com>
Date: Mon, 27 Jun 2022 19:04:17 +0800
From: Yangxi Xiang <xyangxi5@...il.com>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Cc: linux-kernel@...r.kernel.org, Jiri Slaby <jirislaby@...nel.org>,
Johan Hovold <johan@...nel.org>,
Igor Matheus Andrade Torrente <igormtorrente@...il.com>,
Christian Borntraeger <borntraeger@...ux.ibm.com>,
nick black <dankamongmen@...il.com>
Subject: Re: [PATCH] vt: fix memory overlapping when deleting chars in the buffer
> What commit does this fix? how was this tested?
This bug is triggered by running a dynamic analysis on the kernel,
with the help of sanitizer to observe this bug. This memory
overlapping copy can cause data corruption when scr_memcpyw is
optimized to memcpy because memcpy does not ensure its behavior if
the destination buffer overlaps with the source buffer.
Yangxi Xiang
Powered by blists - more mailing lists