Just caught up with all the patches and the final one indeed looks good to me
too!
Kind Regards,
Jordy
> On January 22, 2020 2:20 AM Simon Goldschmidt
> wrote:
>
>
> On Tue, Jan 21, 2020 at 5:53 PM Tom Rini wrote:
> >
> > New analysis by the tool has shown that
responses, I've seen that
different at other software packages thumbs-up for that!
Best Regards,
Jordy
> On January 17, 2020 11:31 AM Tom Rini wrote:
>
>
> On Fri, Jan 17, 2020 at 04:29:52PM +0100, Simon Goldschmidt wrote:
> > + Some contributors of this file
> &g
again.
Double freeing may result in a write-what-where condition, allowing an attacker
to execute arbitrary code.
My advice would be to not free the parition_list on line 702 as nothing is
being done with it there afterwards anyway and leave your clean_up in the out:
label :)
Kind Regards,
Jordy Zomer
ould control this size it could trigger a straight forward
memcpy overflow.
To fix it I'd probably just add some boundary checks in ping_receive() so that
the amount written doesn't exceed the buffer boundaries.
Kind Regards,
Jordy Zomer
___
This is tested with a custom AM3359 (rev 2.0) board.
NAND chip: MT29F16G08ABABAWP
This code allows me to boot from ROM code.
The ROM code forces BCH16 on NAND chips with a 4k page size.
BCH16 is not enabled by default.
---
arch/arm/include/asm/arch-am33xx/cpu.h | 8 +-
arch/arm/include
Please ignore this.
This enables BCH16 by default, which shouldn't happen. I'll will fix this
and send again
On Mon, Jan 28, 2013 at 1:35 PM, Jordy van Wolferen <
jordyvanwolfe...@gmail.com> wrote:
> ---
> arch/arm/include/asm/arch-am33xx/cpu.h | 8 +-
>
6 matches
Mail list logo