lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 3 Nov 2017 13:10:12 +0100 From: Steffen Klassert <steffen.klassert@...unet.com> To: Florian Westphal <fw@...len.de> CC: syzbot <bot+19b21aa652248382e2b8cbb81fa1cdc03b4bda01@...kaller.appspotmail.com>, <davem@...emloft.net>, <herbert@...dor.apana.org.au>, <linux-kernel@...r.kernel.org>, <netdev@...r.kernel.org>, <syzkaller-bugs@...glegroups.com>, <thomas.egerer@...unet.com> Subject: Re: KASAN: stack-out-of-bounds Read in xfrm_state_find (2) On Thu, Nov 02, 2017 at 01:25:28PM +0100, Florian Westphal wrote: > Steffen Klassert <steffen.klassert@...unet.com> wrote: > > > I'd propose to use the addresses from the template unconditionally, > > like the (untested) patch below does. > > > > Unfortunalely the reproducer does not work with my config, > > sendto returns EAGAIN. Could anybody try this patch? > > The reproducer no longer causes KASAN spew with your patch, > but i don't have a test case that actually creates/uses a tunnel. The patch passed my standard tests, so I tend apply it after a day in the ipsec/testing branch.
Powered by blists - more mailing lists