[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YrmPi/D4dZAySgll@kroah.com>
Date: Mon, 27 Jun 2022 13:07:55 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: Yangxi Xiang <xyangxi5@...il.com>
Cc: linux-kernel@...r.kernel.org, Jiri Slaby <jirislaby@...nel.org>,
Johan Hovold <johan@...nel.org>,
Igor Matheus Andrade Torrente <igormtorrente@...il.com>,
Christian Borntraeger <borntraeger@...ux.ibm.com>,
nick black <dankamongmen@...il.com>
Subject: Re: [PATCH] vt: fix memory overlapping when deleting chars in the
buffer
On Mon, Jun 27, 2022 at 07:04:17PM +0800, Yangxi Xiang wrote:
> > What commit does this fix? how was this tested?
>
> This bug is triggered by running a dynamic analysis on the kernel,
> with the help of sanitizer to observe this bug. This memory
> overlapping copy can cause data corruption when scr_memcpyw is
> optimized to memcpy because memcpy does not ensure its behavior if
> the destination buffer overlaps with the source buffer.
And what commit id does this fix, or has it always been broken?
thanks,
greg k-h
Powered by blists - more mailing lists