Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Fri, 21 Mar 2003 19:06:03 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Fri, 21 Mar 2003 19:06:02 -0500 Received: from cerebus.wirex.com ([65.102.14.138]:14331 "EHLO figure1.int.wirex.com") by vger.kernel.org with ESMTP id ; Fri, 21 Mar 2003 19:06:01 -0500 Date: Fri, 21 Mar 2003 16:15:50 -0800 From: Chris Wright To: Junfeng Yang Cc: linux-kernel@vger.kernel.org, mc@cs.stanford.edu, greg@kroah.com Subject: Re: [CHECKER] potential dereference of user pointer errors Message-ID: <20030321161550.D646@figure1.int.wirex.com> Mail-Followup-To: Junfeng Yang , linux-kernel@vger.kernel.org, mc@cs.stanford.edu, greg@kroah.com References: <200303041112.h24BCRW22235@csl.stanford.edu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from yjf@stanford.edu on Thu, Mar 20, 2003 at 10:33:45PM -0800 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 698 Lines: 19 * Junfeng Yang (yjf@stanford.edu) wrote: > > [MINOR] in debug data > > /home/junfeng/linux-2.5.63/drivers/usb/serial/kobil_sct.c:429:kobil_write: > ERROR:TAINTED deferencing "buf" tainted by [dist=0][copy_from_user:parm1] This is a bug, which could print kernel data if debugging was enabled. Greg, any reason the debug info can't just use the priv->buf? thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/