lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 27 Apr 2019 16:13:09 +0100 From: Ben Hutchings <ben@...adent.org.uk> To: linux-kernel@...r.kernel.org, stable@...r.kernel.org CC: akpm@...ux-foundation.org, Denis Kirjanov <kda@...ux-powerpc.org>, "Jorgen Hansen" <jhansen@...are.com>, "Paolo Abeni" <pabeni@...hat.com>, "Stefano Garzarella" <sgarzare@...hat.com>, "Xiumei Mu" <xmu@...hat.com>, "David S. Miller" <davem@...emloft.net> Subject: [PATCH 3.16 143/202] vsock: cope with memory allocation failure at socket creation time 3.16.66-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Paolo Abeni <pabeni@...hat.com> commit 225d9464268599a5b4d094d02ec17808e44c7553 upstream. In the unlikely event that the kmalloc call in vmci_transport_socket_init() fails, we end-up calling vmci_transport_destruct() with a NULL vmci_trans() and oopsing. This change addresses the above explicitly checking for zero vmci_trans() at destruction time. Reported-by: Xiumei Mu <xmu@...hat.com> Fixes: d021c344051a ("VSOCK: Introduce VM Sockets") Signed-off-by: Paolo Abeni <pabeni@...hat.com> Reviewed-by: Stefano Garzarella <sgarzare@...hat.com> Reviewed-by: Jorgen Hansen <jhansen@...are.com> Signed-off-by: David S. Miller <davem@...emloft.net> Signed-off-by: Ben Hutchings <ben@...adent.org.uk> --- net/vmw_vsock/vmci_transport.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/net/vmw_vsock/vmci_transport.c +++ b/net/vmw_vsock/vmci_transport.c @@ -1658,6 +1658,10 @@ static void vmci_transport_cleanup(struc static void vmci_transport_destruct(struct vsock_sock *vsk) { + /* transport can be NULL if we hit a failure at init() time */ + if (!vmci_trans(vsk)) + return; + /* Ensure that the detach callback doesn't use the sk/vsk * we are about to destruct. */
Powered by blists - more mailing lists