lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <KL1PR0601MB577347FD66F203A701A4A618E64B2@KL1PR0601MB5773.apcprd06.prod.outlook.com>
Date: Tue, 29 Oct 2024 06:28:00 +0000
From: Rex Nie <rex.nie@...uarmicro.com>
To: Greg KH <gregkh@...uxfoundation.org>
CC: "bryan.odonoghue@...aro.org" <bryan.odonoghue@...aro.org>,
	"heikki.krogerus@...ux.intel.com" <heikki.krogerus@...ux.intel.com>,
	"linux-arm-msm@...r.kernel.org" <linux-arm-msm@...r.kernel.org>,
	"linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Angus Chen
	<angus.chen@...uarmicro.com>
Subject:
 答复: [PATCH] usb: typec: qcom-pmic: fix uninitialized value hdr_len and txbuf_len


> -----邮件原件-----
> 发件人: Greg KH <gregkh@...uxfoundation.org>
> 发送时间: 2024年10月29日 10:31
> 收件人: Rex Nie <rex.nie@...uarmicro.com>
> 抄送: bryan.odonoghue@...aro.org; heikki.krogerus@...ux.intel.com;
> linux-arm-msm@...r.kernel.org; linux-usb@...r.kernel.org;
> linux-kernel@...r.kernel.org; Angus Chen <angus.chen@...uarmicro.com>
> 主题: Re: [PATCH] usb: typec: qcom-pmic: fix uninitialized value hdr_len and
> txbuf_len
> 
> External Mail: This email originated from OUTSIDE of the organization!
> Do not click links, open attachments or provide ANY information unless you
> recognize the sender and know the content is safe.
> 
> 
> On Tue, Oct 29, 2024 at 10:18:23AM +0800, Rex Nie wrote:
> > If the read of USB_PDPHY_RX_ACKNOWLEDGE_REG failed, then hdr_len and
> > txbuf_len are uninitialized. It makes no sense to print message header
> > and payload. It is also not safe to print uninitialized length of ram.
> >
> > Signed-off-by: Rex Nie <rex.nie@...uarmicro.com>
> 
> What commit id does this fix?
HI greg k-h, This patch fix the commit id: a4422ff221429c600c3dc5d0394fb3738b89d040, authored by Bryan O'Donoghue <bryan.odonoghue@...aro.org>.
Thanks
Rex
> 
> thanks,
> 
> greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ