lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 01 Mar 2017 20:57:52 -0800 (PST) From: David Miller <davem@...emloft.net> To: glider@...gle.com Cc: dvyukov@...gle.com, kcc@...gle.com, edumazet@...gle.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org Subject: Re: [PATCH v4] net: don't call strlen() on the user buffer in packet_bind_spkt() From: Alexander Potapenko <glider@...gle.com> Date: Wed, 1 Mar 2017 12:57:20 +0100 > KMSAN (KernelMemorySanitizer, a new error detection tool) reports use of > uninitialized memory in packet_bind_spkt(): ... > This happens because addr.sa_data copied from the userspace is not > zero-terminated, and copying it with strlcpy() in packet_bind_spkt() > results in calling strlen() on the kernel copy of that non-terminated > buffer. > > Signed-off-by: Alexander Potapenko <glider@...gle.com> > --- > Changes since v3: > - addressed comments by Eric Dumazet (avoid using constants, > use memcpy() instead of strncpy()) Applied and queued up for -stable.
Powered by blists - more mailing lists