lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 22 Apr 2014 23:57:45 -0400 (EDT) From: David Miller <davem@...emloft.net> To: ast@...mgrid.com Cc: dborkman@...hat.com, netdev@...r.kernel.org Subject: Re: [PATCH net] net: filter: initialize A and X registers From: Alexei Starovoitov <ast@...mgrid.com> Date: Tue, 22 Apr 2014 20:18:57 -0700 > exisiting BPF verifier allows uninitialized access to registers, > 'ret A' is considered to be a valid filter. > So initialize A and X to zero to prevent leaking kernel memory > In the future BPF verifier will be rejecting such filters > > Signed-off-by: Alexei Starovoitov <ast@...mgrid.com> Has the code always been like this? Did the eBPF changes introduce this problem either directly or indirectly? -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists