data_offset])) != '/') {
int pathlen;
--
1.8.5.6
-Original Message-
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject: [PATCH 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated
length at nfs_rea
ffset, rlen))
return -;
--
1.8.5.6
-Original Message-
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject: [PATCH 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy
with a failed length check at nfs_read_reply
CVE
efh3_length) > len)
+ return -NFS_RPC_DROP;
memcpy(filefh, rpc_pkt.u.reply.data + 2, filefh3_length);
}
--
1.8.5.6
-Original Message-----
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject:
--
1.8.5.6
-Original Message-
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject: [PATCH 2/5] CVE: nfs: fix stack-based buffer overflow in some
nfs_handler reply helper functions
CVE: nfs: fix stack-based buffer overflow in som
d(DEBUG_DEV_PKT,
"received UDP (to=%pI4, from=%pI4, len=%d)\n",
_ip, _ip, len);
--
1.8.5.6
-Original Message-
From: Simon Goldschmidt [mailto:simon.k.r.goldschm...@gmail.com]
Sent: Thursday, August 22, 2019 3:30 AM
To: liucheng (G)
ffset, rlen))
return -;
--
1.8.5.6
-Original Message-
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject: [PATCH 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy
with a failed length check at nfs_read_reply
CVE
data_offset])) != '/') {
int pathlen;
--
1.8.5.6
-Original Message-
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject: [PATCH 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated
length at nfs_rea
efh3_length) > len)
+ return -NFS_RPC_DROP;
memcpy(filefh, rpc_pkt.u.reply.data + 2, filefh3_length);
}
--
1.8.5.6
-Original Message-----
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject:
--
1.8.5.6
-Original Message-
From: liucheng (G)
Sent: Wednesday, August 21, 2019 10:48 PM
To: u-boot@lists.denx.de
Cc: liucheng (G)
Subject: [PATCH 2/5] CVE: nfs: fix stack-based buffer overflow in some
nfs_handler reply helper functions
CVE: nfs: fix stack-based buffer overflow in som
d(DEBUG_DEV_PKT,
"received UDP (to=%pI4, from=%pI4, len=%d)\n",
_ip, _ip, len);
--
1.8.5.6
-Original Message-
From: Simon Goldschmidt [mailto:simon.k.r.goldschm...@gmail.com]
Sent: Thursday, August 22, 2019 3:30 AM
To:
10 matches
Mail list logo