From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id 0D096386F001; Fri, 19 Mar 2021 01:31:10 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 0D096386F001 From: "oliveandnini at gmail dot com" To: glibc-bugs@sourceware.org Subject: [Bug libc/25620] Signed comparison vulnerability in the ARMv7 memcpy() (CVE-2020-6096) Date: Fri, 19 Mar 2021 01:31:10 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: glibc X-Bugzilla-Component: libc X-Bugzilla-Version: 2.32 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: oliveandnini at gmail dot com X-Bugzilla-Status: RESOLVED X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: unassigned at sourceware dot org X-Bugzilla-Target-Milestone: 2.32 X-Bugzilla-Flags: security+ X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: glibc-bugs@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Glibc-bugs mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Mar 2021 01:31:11 -0000 https://sourceware.org/bugzilla/show_bug.cgi?id=3D25620 Jonie Tilton changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |oliveandnini at gmail dot = com --- Comment #31 from Jonie Tilton --- (In reply to cvs-commit@gcc.gnu.org from comment #28) > The master branch has been updated by Aurelien Jarno > : >=20 > https://sourceware.org/git/gitweb.cgi?p=3Dglibc.git; > h=3D7b5f02dc2a9278cd068a58a3db3644e24707be49 > https://happywheels2.io > commit 7b5f02dc2a9278cd068a58a3db3644e24707be49 > Author: Aurelien Jarno > Date: Mon Jul 13 22:37:41 2020 +0200 >=20 > arm: remove string/tst-memmove-overflow XFAIL >=20=20=20=20=20 > The arm string/tst-memmove-overflow XFAIL has been added in commit > eca1b233322 ("arm: XFAIL string/tst-memmove-overflow due to bug 25620= ") > as a way to reproduce the reported bug. >=20=20=20=20=20 > Now that this bug has been fixed in commits 79a4fa341b8 ("arm: > CVE-2020-6096: fix memcpy and memmove for negative length [BZ #25620]= ") > and beea3610507 ("arm: CVE-2020-6096: Fix multiarch memcpy for negati= ve > length [BZ #25620]"), let's remove the XFAIL. >=20=20=20=20=20 > Reviewed-by: Carlos O'Donell Also reduce the amount of output in case of a large-scale mismatch in the copied data. --=20 You are receiving this mail because: You are on the CC list for the bug.=