[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1770781.3L9ebnaMWA@myon.chronox.de>
Date: Wed, 30 Dec 2015 21:54:09 +0100
From: Stephan Mueller <smueller@...onox.de>
To: Dmitry Vyukov <dvyukov@...gle.com>
Cc: Herbert Xu <herbert@...dor.apana.org.au>,
"David S. Miller" <davem@...emloft.net>,
linux-crypto@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>,
syzkaller <syzkaller@...glegroups.com>,
Kostya Serebryany <kcc@...gle.com>,
Alexander Potapenko <glider@...gle.com>,
Sasha Levin <sasha.levin@...cle.com>,
Eric Dumazet <edumazet@...gle.com>
Subject: Re: crypto: use-after-free in rng_recvmsg
Am Montag, 28. Dezember 2015, 14:48:48 schrieb Dmitry Vyukov:
Hi Dmitry,
> Hello,
>
> On commit a88164345b81292b55a8d4829fdd35c8d611cd7d (Dec 23)
> + crypto: algif_skcipher - Use new skcipher interface
> + crypto: algif_skcipher - Require setkey before accept(2)
>
> The following program triggers use-after-free in rng_recvmsg:
Thank you for the bug report.
After applying the patch from Herbert [1], I was not able to reproduce the
issue even after 1000 rounds of the test code. Considering the issue and the
patch from Herbert, I would consider the issue being fixed.
[1] http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg17450.html
Thank you.
--
Ciao
Stephan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists