* [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL
@ 2020-07-13 21:23 Aurelien Jarno
2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
2020-07-15 20:51 ` [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Carlos O'Donell
0 siblings, 2 replies; 4+ messages in thread
From: Aurelien Jarno @ 2020-07-13 21:23 UTC (permalink / raw)
To: libc-alpha
The arm string/tst-memmove-overflow XFAIL has been added in commit
eca1b233322 ("arm: XFAIL string/tst-memmove-overflow due to bug 25620")
as a way to reproduce the reported bug.
Now that this bug has been fixed in commits 79a4fa341b8 ("arm:
CVE-2020-6096: fix memcpy and memmove for negative length [BZ #25620]")
and beea3610507 ("arm: CVE-2020-6096: Fix multiarch memcpy for negative
length [BZ #25620]"), let's remove the XFAIL.
---
sysdeps/arm/Makefile | 5 -----
1 file changed, 5 deletions(-)
diff --git a/sysdeps/arm/Makefile b/sysdeps/arm/Makefile
index a0cb7f3c32e..ad2042b93a1 100644
--- a/sysdeps/arm/Makefile
+++ b/sysdeps/arm/Makefile
@@ -68,8 +68,3 @@ ifeq ($(subdir),nptl)
libpthread-sysdep_routines += pt-arm-unwind-resume
libpthread-shared-only-routines += pt-arm-unwind-resume
endif
-
-ifeq ($(subdir),string)
-# This test fails on arm due to bug 25620 and related issues.
-test-xfail-tst-memmove-overflow = yes
-endif
--
2.27.0
^ permalink raw reply [flat|nested] 4+ messages in thread
* [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620)
2020-07-13 21:23 [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Aurelien Jarno
@ 2020-07-13 21:23 ` Aurelien Jarno
2020-07-15 20:52 ` Carlos O'Donell
2020-07-15 20:51 ` [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Carlos O'Donell
1 sibling, 1 reply; 4+ messages in thread
From: Aurelien Jarno @ 2020-07-13 21:23 UTC (permalink / raw)
To: libc-alpha
---
NEWS | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/NEWS b/NEWS
index 81b014a7ee4..5051e804eaf 100644
--- a/NEWS
+++ b/NEWS
@@ -174,6 +174,11 @@ Security related changes:
CVE-2020-1752: A use-after-free vulnerability in the glob function when
expanding ~user has been fixed.
+ CVE-2020-6096: A signed comparison vulnerability in the ARMv7 memcpy and
+ memmove functions has been fixed. Discovered by Jason Royes and Samual
+ Dytrych of the Cisco Security Assessment and Penetration Team (See
+ TALOS-2020-1019).
+
The following bugs are resolved with this release:
[The release manager will add the list generated by
--
2.27.0
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL
2020-07-13 21:23 [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Aurelien Jarno
2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
@ 2020-07-15 20:51 ` Carlos O'Donell
1 sibling, 0 replies; 4+ messages in thread
From: Carlos O'Donell @ 2020-07-15 20:51 UTC (permalink / raw)
To: Aurelien Jarno, libc-alpha
On 7/13/20 5:23 PM, Aurelien Jarno wrote:
> The arm string/tst-memmove-overflow XFAIL has been added in commit
> eca1b233322 ("arm: XFAIL string/tst-memmove-overflow due to bug 25620")
> as a way to reproduce the reported bug.
>
> Now that this bug has been fixed in commits 79a4fa341b8 ("arm:
> CVE-2020-6096: fix memcpy and memmove for negative length [BZ #25620]")
> and beea3610507 ("arm: CVE-2020-6096: Fix multiarch memcpy for negative
> length [BZ #25620]"), let's remove the XFAIL.
OK for 2.32.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
> ---
> sysdeps/arm/Makefile | 5 -----
> 1 file changed, 5 deletions(-)
>
> diff --git a/sysdeps/arm/Makefile b/sysdeps/arm/Makefile
> index a0cb7f3c32e..ad2042b93a1 100644
> --- a/sysdeps/arm/Makefile
> +++ b/sysdeps/arm/Makefile
> @@ -68,8 +68,3 @@ ifeq ($(subdir),nptl)
> libpthread-sysdep_routines += pt-arm-unwind-resume
> libpthread-shared-only-routines += pt-arm-unwind-resume
> endif
> -
> -ifeq ($(subdir),string)
> -# This test fails on arm due to bug 25620 and related issues.
> -test-xfail-tst-memmove-overflow = yes
> -endif
>
--
Cheers,
Carlos.
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620)
2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
@ 2020-07-15 20:52 ` Carlos O'Donell
0 siblings, 0 replies; 4+ messages in thread
From: Carlos O'Donell @ 2020-07-15 20:52 UTC (permalink / raw)
To: Aurelien Jarno, libc-alpha
OK for 2.32
Reviewed-by: Carlos O'Donell <carlos@redhat.com
On 7/13/20 5:23 PM, Aurelien Jarno wrote:
> ---
> NEWS | 5 +++++
> 1 file changed, 5 insertions(+)
>
> diff --git a/NEWS b/NEWS
> index 81b014a7ee4..5051e804eaf 100644
> --- a/NEWS
> +++ b/NEWS
> @@ -174,6 +174,11 @@ Security related changes:
> CVE-2020-1752: A use-after-free vulnerability in the glob function when
> expanding ~user has been fixed.
>
> + CVE-2020-6096: A signed comparison vulnerability in the ARMv7 memcpy and
> + memmove functions has been fixed. Discovered by Jason Royes and Samual
> + Dytrych of the Cisco Security Assessment and Penetration Team (See
> + TALOS-2020-1019).
> +
> The following bugs are resolved with this release:
>
> [The release manager will add the list generated by
>
--
Cheers,
Carlos.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2020-07-15 20:52 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-13 21:23 [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Aurelien Jarno
2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
2020-07-15 20:52 ` Carlos O'Donell
2020-07-15 20:51 ` [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Carlos O'Donell
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).