Re: [PATCH] i2c: fix stack buffer overflow vulnerability in i2c md command

2022-06-28 Thread Tom Rini
On Fri, Jun 10, 2022 at 02:50:25PM +, nicolas.iooss.led...@proton.me wrote: > From: Nicolas Iooss > > When running "i2c md 0 0 8100", the function do_i2c_md parses the > length into an unsigned int variable named length. The value is then > moved to a signed variable: > > int

Re: [PATCH] i2c: fix stack buffer overflow vulnerability in i2c md command

2022-06-27 Thread Tom Rini
On Mon, Jun 27, 2022 at 06:33:01AM +0200, Heiko Schocher wrote: > Hello Nicolas, > > On 21.06.22 16:04, Nicolas IOOSS wrote: > > Hello, > > > > I sent some days ago the vulnerability fix below. I have not received any > > reply yet. Could a maintainer take a look at it, please? > > Sorry for

Re: [PATCH] i2c: fix stack buffer overflow vulnerability in i2c md command

2022-06-26 Thread Heiko Schocher
Hello Nicolas, On 21.06.22 16:04, Nicolas IOOSS wrote: > Hello, > > I sent some days ago the vulnerability fix below. I have not received any > reply yet. Could a maintainer take a look at it, please? Sorry for that, but I was on the road (embedded world in nuremberg). > Best regards, >

Re: [PATCH] i2c: fix stack buffer overflow vulnerability in i2c md command

2022-06-21 Thread Nicolas IOOSS
Hello, I sent some days ago the vulnerability fix below. I have not received any reply yet. Could a maintainer take a look at it, please? Best regards, Nicolas --- Original Message --- Le vendredi 10 juin 2022 à 4:50 PM, a écrit : > From: Nicolas Iooss nicolas.iooss+ub...@ledger.fr