lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ffb39127-a462-4ce2-be37-cba8a36c8064@gmail.com>
Date: Thu, 11 Jan 2024 16:45:24 +0800
From: Gui-Dong Han <2045gemini@...il.com>
To: marcel@...tmann.org, johan.hedberg@...il.com, luiz.dentz@...il.com
Cc: linux-bluetooth@...r.kernel.org, linux-kernel@...r.kernel.org,
 baijiaju1990@...look.com, stable@...r.kernel.org
Subject: Re: [PATCH v2] Bluetooth: Fix atomicity violation in
 {min,max}_key_size_set

Dear All, I hope this message finds you well. Following up on my 
previous email regarding the patch, I want to highlight an important 
aspect. In /net/bluetooth/hci_debugfs.c, there are four similar bugs 
related to atomicity violations, potentially leading to minimum values 
exceeding maximum ones. 
https://patchwork.kernel.org/project/bluetooth/patch/20231222162931.6553-1-2045gemini@gmail.com/ 
https://patchwork.kernel.org/project/bluetooth/patch/20231222162310.6461-1-2045gemini@gmail.com/ 
https://patchwork.kernel.org/project/bluetooth/patch/20231222161317.6255-1-2045gemini@gmail.com/ 
https://patchwork.kernel.org/project/bluetooth/patch/20231222151241.4331-1-2045gemini@gmail.com/ 
I kindly request your review of these issues alongside the original 
patch. Understanding your busy schedules, your prompt attention to this 
consolidated review would be greatly appreciated. Thank you for your 
time and consideration. Best regards, Han

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ