lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 11 Aug 2019 21:29:28 -0700 (PDT) From: David Miller <davem@...emloft.net> To: dhowells@...hat.com Cc: netdev@...r.kernel.org, jaltman@...istor.com, linux-afs@...ts.infradead.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH net] rxrpc: Fix local refcounting From: David Howells <dhowells@...hat.com> Date: Fri, 09 Aug 2019 22:47:47 +0100 > Fix rxrpc_unuse_local() to handle a NULL local pointer as it can be called > on an unbound socket on which rx->local is not yet set. > > The following reproduced (includes omitted): > > int main(void) > { > socket(AF_RXRPC, SOCK_DGRAM, AF_INET); > return 0; > } > > causes the following oops to occur: > > BUG: kernel NULL pointer dereference, address: 0000000000000010 > ... > RIP: 0010:rxrpc_unuse_local+0x8/0x1b > ... > Call Trace: > rxrpc_release+0x2b5/0x338 > __sock_release+0x37/0xa1 > sock_close+0x14/0x17 > __fput+0x115/0x1e9 > task_work_run+0x72/0x98 > do_exit+0x51b/0xa7a > ? __context_tracking_exit+0x4e/0x10e > do_group_exit+0xab/0xab > __x64_sys_exit_group+0x14/0x17 > do_syscall_64+0x89/0x1d4 > entry_SYSCALL_64_after_hwframe+0x49/0xbe > > Reported-by: syzbot+20dee719a2e090427b5f@...kaller.appspotmail.com > Fixes: 730c5fd42c1e ("rxrpc: Fix local endpoint refcounting") > Signed-off-by: David Howells <dhowells@...hat.com> > cc: Jeffrey Altman <jaltman@...istor.com> Applied.
Powered by blists - more mailing lists