lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 21 Dec 2017 03:20:01 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     Alexei Starovoitov <ast@...nel.org>,
        "David S . Miller" <davem@...emloft.net>
Cc:     Jann Horn <jannh@...gle.com>, Edward Cree <ecree@...arflare.com>,
        netdev@...r.kernel.org, kernel-team@...com
Subject: Re: [PATCH bpf 0/9] bpf: verifier security fixes

On 12/19/2017 05:11 AM, Alexei Starovoitov wrote:
> This patch set addresses a set of security vulnerabilities
> in bpf verifier logic discovered by Jann Horn.
> All of the patches are candidates for 4.14 stable.
> 
> Alexei Starovoitov (1):
>   bpf: fix integer overflows
> 
> Edward Cree (1):
>   bpf/verifier: fix bounds calculation on BPF_RSH
> 
> Jann Horn (7):
>   bpf: fix incorrect sign extension in check_alu_op()
>   bpf: fix incorrect tracking of register size truncation
>   bpf: fix 32-bit ALU op verification
>   bpf: fix missing error return in check_stack_boundary()
>   bpf: force strict alignment checks for stack pointers
>   bpf: don't prune branches when a scalar is replaced with a pointer
>   selftests/bpf: add tests for recent bugfixes
> 
>  include/linux/bpf_verifier.h                |   4 +-
>  kernel/bpf/verifier.c                       | 175 ++++++---
>  tools/testing/selftests/bpf/test_verifier.c | 549 +++++++++++++++++++++++++++-
>  3 files changed, 661 insertions(+), 67 deletions(-)

Series applied to bpf tree and queued for stable, thanks everyone!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ