Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262262AbTEATzZ (ORCPT ); Thu, 1 May 2003 15:55:25 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262265AbTEATzZ (ORCPT ); Thu, 1 May 2003 15:55:25 -0400 Received: from elaine24.Stanford.EDU ([171.64.15.99]:2995 "EHLO elaine24.Stanford.EDU") by vger.kernel.org with ESMTP id S262262AbTEATzW (ORCPT ); Thu, 1 May 2003 15:55:22 -0400 Date: Thu, 1 May 2003 13:07:38 -0700 (PDT) From: Junfeng Yang To: Michael Hunold cc: Linux Kernel Mailing List , Subject: Re: [CHECKER] 5 potential user-pointer errors that allow arbitrary reads from kernel In-Reply-To: <3EB118F9.9030003@web.de> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1026 Lines: 34 Thanks a lot for the feedback and the incoming patch! -Junfeng On Thu, 1 May 2003, Michael Hunold wrote: > Hello Junfeng, > > > This is a resend (the previous report was ignored, however I feel that > > these bugs could be severe). > > > Please confirm or clarify. Thanks! > > > [BUG] proc_dir_entry.write_proc can take tainted inputs. > > av7110_ir_write_proc is assigned to proc_dir_entry.write_proc > > > > /home/junfeng/linux-2.5.63/drivers/media/dvb/av7110/av7110_ir.c:116:av7110_ir_write_proc: > > ERROR:TAINTED:116:116: passing tainted ptr 'buffer' to __constant_memcpy > > [Callstack: > > /home/junfeng/linux-2.5.63/net/core/pktgen.c:991:av7110_ir_write_proc((tainted > > 1))] > > Confirmed. I'll post a patch when I'm back at work again on Monday. > > CU > Michael. > - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/