[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <17c94d87-e260-4155-90c1-b7e5013ac69e@web.de>
Date: Wed, 10 Jul 2024 15:05:31 +0200
From: Markus Elfring <Markus.Elfring@....de>
To: make24@...as.ac.cn, linuxppc-dev@...ts.ozlabs.org,
kernel-janitors@...r.kernel.org
Cc: stable@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>,
Aleksandr Mishin <amishin@...rgos.ru>, Andrew Donnellan <ajd@...ux.ibm.com>,
Arnd Bergmann <arnd@...db.de>,
Christophe Lombard <clombard@...ux.vnet.ibm.com>,
Frederic Barrat <fbarrat@...ux.ibm.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Ian Munsie <imunsie@....ibm.com>, "Manoj N. Kumar" <manoj@...ux.ibm.com>,
Maxime Ripard <mripard@...nel.org>, Michael Ellerman <mpe@...erman.id.au>,
Shuah Khan <shuah@...nel.org>, Wei Liu <wei.liu@...nel.org>
Subject: Re: [v2] cxl: Fix possible null pointer dereference in read_handle()
…
> - The potential vulnerability was discovered as follows: based on our
> customized static analysis tool,
I became curious in which time range further corresponding information will be published.
> extract vulnerability features[1],
Various software corrections were published through the years.
Several error (or weakness) categories are known already.
https://cwe.mitre.org/
https://wiki.sei.cmu.edu/confluence/display/c/
> and then match similar vulnerability features in this function.
> - Reference link:
> [1] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2d9adecc88ab678785b581ab021f039372c324cb
Another reference format can be helpful also for the commit c534b63bede6cb987c2946ed4d0b0013a52c5ba7
("drm: vc4: Fix possible null pointer dereference") from 2024-04-15.
Regards,
Markus
Powered by blists - more mailing lists