lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 18 Nov 2021 11:20:08 +0000
From:   patchwork-bot+netdevbpf@...nel.org
To:     Teng Qi <starmiku1207184332@...il.com>
Cc:     yisen.zhuang@...wei.com, salil.mehta@...wei.com,
        davem@...emloft.net, kuba@...nel.org, lipeng321@...wei.com,
        huangguangbin2@...wei.com, zhengyongjun3@...wei.com,
        liuyonglong@...wei.com, shenyang39@...wei.com,
        netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
        baijiaju1990@...il.com, islituo@...il.com, oslab@...nghua.edu.cn
Subject: Re: [PATCH] ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array
 overflow in hns_dsaf_ge_srst_by_port()

Hello:

This patch was applied to netdev/net.git (master)
by David S. Miller <davem@...emloft.net>:

On Wed, 17 Nov 2021 11:44:53 +0800 you wrote:
> The if statement:
>   if (port >= DSAF_GE_NUM)
>         return;
> 
> limits the value of port less than DSAF_GE_NUM (i.e., 8).
> However, if the value of port is 6 or 7, an array overflow could occur:
>   port_rst_off = dsaf_dev->mac_cb[port]->port_rst_off;
> 
> [...]

Here is the summary with links:
  - ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
    https://git.kernel.org/netdev/net/c/a66998e0fbf2

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ