On 12/22/18 8:42 PM, David Miller wrote:
From: "Gustavo A. R. Silva"
Date: Sat, 22 Dec 2018 17:37:35 -0600
I wonder if you can take this one too:
https://lore.kernel.org/lkml/20181221212229.GA32635@embeddedor/
It's pretty similar to the af_nfc one.
Sure, done.
Great. Thanks.
--
Gusta
From: "Gustavo A. R. Silva"
Date: Sat, 22 Dec 2018 17:37:35 -0600
> I wonder if you can take this one too:
>
> https://lore.kernel.org/lkml/20181221212229.GA32635@embeddedor/
>
> It's pretty similar to the af_nfc one.
Sure, done.
On 12/22/18 5:09 PM, David Miller wrote:
From: "Gustavo A. R. Silva"
Date: Fri, 21 Dec 2018 15:47:53 -0600
proto is indirectly controlled by user-space, hence leading to
a potential exploitation of the Spectre variant 1 vulnerability.
This issue was detected with the help of Smatch:
net/n
From: "Gustavo A. R. Silva"
Date: Fri, 21 Dec 2018 15:47:53 -0600
> proto is indirectly controlled by user-space, hence leading to
> a potential exploitation of the Spectre variant 1 vulnerability.
>
> This issue was detected with the help of Smatch:
>
> net/nfc/af_nfc.c:42 nfc_sock_create() wa
proto is indirectly controlled by user-space, hence leading to
a potential exploitation of the Spectre variant 1 vulnerability.
This issue was detected with the help of Smatch:
net/nfc/af_nfc.c:42 nfc_sock_create() warn: potential spectre issue 'proto_tab'
[w] (local cap)
Fix this by sanitizing