public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
* [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL
@ 2020-07-13 21:23 Aurelien Jarno
  2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
  2020-07-15 20:51 ` [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Carlos O'Donell
  0 siblings, 2 replies; 4+ messages in thread
From: Aurelien Jarno @ 2020-07-13 21:23 UTC (permalink / raw)
  To: libc-alpha

The arm string/tst-memmove-overflow XFAIL has been added in commit
eca1b233322 ("arm: XFAIL string/tst-memmove-overflow due to bug 25620")
as a way to reproduce the reported bug.

Now that this bug has been fixed in commits 79a4fa341b8 ("arm:
CVE-2020-6096: fix memcpy and memmove for negative length [BZ #25620]")
and beea3610507 ("arm: CVE-2020-6096: Fix multiarch memcpy for negative
length [BZ #25620]"), let's remove the XFAIL.
---
 sysdeps/arm/Makefile | 5 -----
 1 file changed, 5 deletions(-)

diff --git a/sysdeps/arm/Makefile b/sysdeps/arm/Makefile
index a0cb7f3c32e..ad2042b93a1 100644
--- a/sysdeps/arm/Makefile
+++ b/sysdeps/arm/Makefile
@@ -68,8 +68,3 @@ ifeq ($(subdir),nptl)
 libpthread-sysdep_routines += pt-arm-unwind-resume
 libpthread-shared-only-routines += pt-arm-unwind-resume
 endif
-
-ifeq ($(subdir),string)
-# This test fails on arm due to bug 25620 and related issues.
-test-xfail-tst-memmove-overflow = yes
-endif
-- 
2.27.0


^ permalink raw reply	[flat|nested] 4+ messages in thread

* [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620)
  2020-07-13 21:23 [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Aurelien Jarno
@ 2020-07-13 21:23 ` Aurelien Jarno
  2020-07-15 20:52   ` Carlos O'Donell
  2020-07-15 20:51 ` [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Carlos O'Donell
  1 sibling, 1 reply; 4+ messages in thread
From: Aurelien Jarno @ 2020-07-13 21:23 UTC (permalink / raw)
  To: libc-alpha

---
 NEWS | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/NEWS b/NEWS
index 81b014a7ee4..5051e804eaf 100644
--- a/NEWS
+++ b/NEWS
@@ -174,6 +174,11 @@ Security related changes:
   CVE-2020-1752: A use-after-free vulnerability in the glob function when
   expanding ~user has been fixed.
 
+  CVE-2020-6096: A signed comparison vulnerability in the ARMv7 memcpy and
+  memmove functions has been fixed.  Discovered by Jason Royes and Samual
+  Dytrych of the Cisco Security Assessment and Penetration Team (See
+  TALOS-2020-1019).
+
 The following bugs are resolved with this release:
 
   [The release manager will add the list generated by
-- 
2.27.0


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL
  2020-07-13 21:23 [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Aurelien Jarno
  2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
@ 2020-07-15 20:51 ` Carlos O'Donell
  1 sibling, 0 replies; 4+ messages in thread
From: Carlos O'Donell @ 2020-07-15 20:51 UTC (permalink / raw)
  To: Aurelien Jarno, libc-alpha

On 7/13/20 5:23 PM, Aurelien Jarno wrote:
> The arm string/tst-memmove-overflow XFAIL has been added in commit
> eca1b233322 ("arm: XFAIL string/tst-memmove-overflow due to bug 25620")
> as a way to reproduce the reported bug.
> 
> Now that this bug has been fixed in commits 79a4fa341b8 ("arm:
> CVE-2020-6096: fix memcpy and memmove for negative length [BZ #25620]")
> and beea3610507 ("arm: CVE-2020-6096: Fix multiarch memcpy for negative
> length [BZ #25620]"), let's remove the XFAIL.

OK for 2.32.

Reviewed-by: Carlos O'Donell <carlos@redhat.com>

> ---
>  sysdeps/arm/Makefile | 5 -----
>  1 file changed, 5 deletions(-)
> 
> diff --git a/sysdeps/arm/Makefile b/sysdeps/arm/Makefile
> index a0cb7f3c32e..ad2042b93a1 100644
> --- a/sysdeps/arm/Makefile
> +++ b/sysdeps/arm/Makefile
> @@ -68,8 +68,3 @@ ifeq ($(subdir),nptl)
>  libpthread-sysdep_routines += pt-arm-unwind-resume
>  libpthread-shared-only-routines += pt-arm-unwind-resume
>  endif
> -
> -ifeq ($(subdir),string)
> -# This test fails on arm due to bug 25620 and related issues.
> -test-xfail-tst-memmove-overflow = yes
> -endif
> 


-- 
Cheers,
Carlos.


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620)
  2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
@ 2020-07-15 20:52   ` Carlos O'Donell
  0 siblings, 0 replies; 4+ messages in thread
From: Carlos O'Donell @ 2020-07-15 20:52 UTC (permalink / raw)
  To: Aurelien Jarno, libc-alpha


OK for 2.32

Reviewed-by: Carlos O'Donell <carlos@redhat.com

On 7/13/20 5:23 PM, Aurelien Jarno wrote:
> ---
>  NEWS | 5 +++++
>  1 file changed, 5 insertions(+)
> 
> diff --git a/NEWS b/NEWS
> index 81b014a7ee4..5051e804eaf 100644
> --- a/NEWS
> +++ b/NEWS
> @@ -174,6 +174,11 @@ Security related changes:
>    CVE-2020-1752: A use-after-free vulnerability in the glob function when
>    expanding ~user has been fixed.
>  
> +  CVE-2020-6096: A signed comparison vulnerability in the ARMv7 memcpy and
> +  memmove functions has been fixed.  Discovered by Jason Royes and Samual
> +  Dytrych of the Cisco Security Assessment and Penetration Team (See
> +  TALOS-2020-1019).
> +
>  The following bugs are resolved with this release:
>  
>    [The release manager will add the list generated by
> 


-- 
Cheers,
Carlos.


^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2020-07-15 20:52 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-13 21:23 [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Aurelien Jarno
2020-07-13 21:23 ` [PATCH v2 2/2] Add NEWS entry for CVE-2020-6096 (bug 25620) Aurelien Jarno
2020-07-15 20:52   ` Carlos O'Donell
2020-07-15 20:51 ` [PATCH v2 1/2] arm: remove string/tst-memmove-overflow XFAIL Carlos O'Donell

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).