lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202412161633.8F8CF08C@keescook>
Date: Mon, 16 Dec 2024 16:34:51 -0800
From: Kees Cook <kees@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel@...r.kernel.org,
	Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
	Kees Cook <kees@...nel.org>, Nilay Shroff <nilay@...ux.ibm.com>,
	Thomas Weißschuh <linux@...ssschuh.net>,
	Yury Norov <yury.norov@...il.com>
Subject: [GIT PULL] hardening fix for v6.13-rc4

Hi Linus,

Please pull this hardening fix for v6.13-rc4. Silences a GCC value-range
warning that is being ironically triggered by bounds checking.

Thanks!

-Kees

The following changes since commit f06e108a3dc53c0f5234d18de0bd224753db5019:

  Compiler Attributes: disable __counted_by for clang < 19.1.3 (2024-11-19 08:48:27 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/hardening-v6.13-rc4

for you to fetch changes up to 239d87327dcd361b0098038995f8908f3296864f:

  fortify: Hide run-time copy size from value range tracking (2024-12-16 16:23:07 -0800)

----------------------------------------------------------------
hardening fix for v6.13-rc4

- FORTIFY: Silence GCC value range warnings due to warning-only bounds checks

----------------------------------------------------------------
Kees Cook (1):
      fortify: Hide run-time copy size from value range tracking

 include/linux/fortify-string.h | 14 +++++++++++++-
 1 file changed, 13 insertions(+), 1 deletion(-)

-- 
Kees Cook

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ