lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 17 Oct 2012 13:59:39 -0400 From: Sasha Levin <levinsasha928@...il.com> To: "J. Bruce Fields" <bfields@...ldses.org> Cc: Trond.Myklebust@...app.com, davem@...emloft.net, davej@...hat.com, linux-nfs@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] SUNRPC: Prevent kernel stack corruption on long values of flush On Wed, Jul 18, 2012 at 1:39 PM, J. Bruce Fields <bfields@...ldses.org> wrote: > On Tue, Jul 17, 2012 at 12:01:26AM +0200, Sasha Levin wrote: >> The buffer size in read_flush() is too small for the longest possible values >> for it. This can lead to a kernel stack corruption: > > Thanks! I've just stumbled on this crash again, and noticed that this patch never made it in. Was it just a mixup, or is something still missing? Thanks, Sasha -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists