lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <167108041703.25534.13058218525708275805.git-patchwork-notify@kernel.org> Date: Thu, 15 Dec 2022 05:00:17 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Minsuk Kang <linuxlovemin@...sei.ac.kr> Cc: krzysztof.kozlowski@...aro.org, netdev@...r.kernel.org, linma@....edu.cn, davem@...emloft.net, sameo@...ux.intel.com, linville@...driver.com, dokyungs@...sei.ac.kr, jisoo.jang@...sei.ac.kr Subject: Re: [PATCH net v3] nfc: pn533: Clear nfc_target before being used Hello: This patch was applied to netdev/net.git (master) by Jakub Kicinski <kuba@...nel.org>: On Wed, 14 Dec 2022 10:51:39 +0900 you wrote: > Fix a slab-out-of-bounds read that occurs in nla_put() called from > nfc_genl_send_target() when target->sensb_res_len, which is duplicated > from an nfc_target in pn533, is too large as the nfc_target is not > properly initialized and retains garbage values. Clear nfc_targets with > memset() before they are used. > > Found by a modified version of syzkaller. > > [...] Here is the summary with links: - [net,v3] nfc: pn533: Clear nfc_target before being used https://git.kernel.org/netdev/net/c/9f28157778ed You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists