[U-Boot] [PATCH v2 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated length at nfs_readlink_reply //RE: [PATCH 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated length at n

2019-08-29 Thread liucheng (G)
data_offset])) != '/') { int pathlen; -- 1.8.5.6 -Original Message- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject: [PATCH 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated length at nfs_rea

[U-Boot] [PATCH v2 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy with a failed length check at nfs_read_reply //RE: [PATCH 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy

2019-08-29 Thread liucheng (G)
ffset, rlen)) return -; -- 1.8.5.6 -Original Message- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject: [PATCH 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy with a failed length check at nfs_read_reply CVE

[U-Boot] [PATCH v2 5/5] CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply //RE: [PATCH 5/5] CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check

2019-08-29 Thread liucheng (G)
efh3_length) > len) + return -NFS_RPC_DROP; memcpy(filefh, rpc_pkt.u.reply.data + 2, filefh3_length); } -- 1.8.5.6 -Original Message----- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject:

[U-Boot] [PATCH v2 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions //RE: [PATCH 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helpe

2019-08-29 Thread liucheng (G)
-- 1.8.5.6 -Original Message- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject: [PATCH 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions CVE: nfs: fix stack-based buffer overflow in som

[U-Boot] [PATCH v2 1/5] CVE: net: fix unbounded memcpy of UDP packet//RE: [PATCH 1/5] CVE: net: fix unbounded memcpy of UDP packet

2019-08-29 Thread liucheng (G)
d(DEBUG_DEV_PKT, "received UDP (to=%pI4, from=%pI4, len=%d)\n", _ip, _ip, len); -- 1.8.5.6 -Original Message- From: Simon Goldschmidt [mailto:simon.k.r.goldschm...@gmail.com] Sent: Thursday, August 22, 2019 3:30 AM To: liucheng (G)

[U-Boot] [PATCH v2 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy with a failed length check at nfs_read_reply //RE: [PATCH 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy

2019-08-21 Thread liucheng (G)
ffset, rlen)) return -; -- 1.8.5.6 -Original Message- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject: [PATCH 3/5] CVE-2019-14194/CVE-2019-14198: nfs: fix unbounded memcpy with a failed length check at nfs_read_reply CVE

[U-Boot] [PATCH v2 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated length at nfs_readlink_reply //RE: [PATCH 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated length at n

2019-08-21 Thread liucheng (G)
data_offset])) != '/') { int pathlen; -- 1.8.5.6 -Original Message- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject: [PATCH 4/5] CVE-2019-14195: nfs: fix unbounded memcpy with unvalidated length at nfs_rea

[U-Boot] [PATCH v2 5/5] CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply //RE: [PATCH 5/5] CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check

2019-08-21 Thread liucheng (G)
efh3_length) > len) + return -NFS_RPC_DROP; memcpy(filefh, rpc_pkt.u.reply.data + 2, filefh3_length); } -- 1.8.5.6 -Original Message----- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject:

[U-Boot] [PATCH v2 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions //RE: [PATCH 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helpe

2019-08-21 Thread liucheng (G)
-- 1.8.5.6 -Original Message- From: liucheng (G) Sent: Wednesday, August 21, 2019 10:48 PM To: u-boot@lists.denx.de Cc: liucheng (G) Subject: [PATCH 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions CVE: nfs: fix stack-based buffer overflow in som

[U-Boot] [PATCH v2 1/5] CVE: net: fix unbounded memcpy of UDP packet//RE: [PATCH 1/5] CVE: net: fix unbounded memcpy of UDP packet

2019-08-21 Thread liucheng (G)
d(DEBUG_DEV_PKT, "received UDP (to=%pI4, from=%pI4, len=%d)\n", _ip, _ip, len); -- 1.8.5.6 -Original Message- From: Simon Goldschmidt [mailto:simon.k.r.goldschm...@gmail.com] Sent: Thursday, August 22, 2019 3:30 AM To: