lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 13 Jun 2018 20:42:29 +0200 From: Daniel Borkmann <daniel@...earbox.net> To: syzbot <syzbot+76de61614cb1abdd73fc@...kaller.appspotmail.com>, ast@...nel.org, davem@...emloft.net, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, syzkaller-bugs@...glegroups.com Subject: Re: KASAN: slab-out-of-bounds Read in bpf_skb_vlan_push On 06/13/2018 08:34 PM, syzbot wrote: > Hello, > > syzbot has tested the proposed patch and the reproducer did not trigger crash: > > Reported-and-tested-by: syzbot+76de61614cb1abdd73fc@...kaller.appspotmail.com > > Tested on: > > commit: be779f03d563 Merge tag 'kbuild-v4.18-2' of git://git.kerne.. > git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/-- > kernel config: https://syzkaller.appspot.com/x/.config?x=68d8eba98e3f8e88 > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > > Note: testing is done by a robot and is best-effort only. #syz fix: bpf: reject passing modified ctx to helper functions
Powered by blists - more mailing lists