lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 30 Jan 2016 09:01:56 +1100 From: Julian Calaby <julian.calaby@...il.com> To: Cong Wang <xiyou.wangcong@...il.com> Cc: netdev <netdev@...r.kernel.org>, Dmitry Vyukov <dvyukov@...gle.com>, Eric Dumazet <eric.dumazet@...il.com>, linux-wireless <linux-wireless@...r.kernel.org>, Lauro Ramos Venancio <lauro.venancio@...nbossa.org>, Aloisio Almeida Jr <aloisio.almeida@...nbossa.org>, Samuel Ortiz <sameo@...ux.intel.com> Subject: Re: [PATCH v2 net] nfc: use GFP_USER for user-controlled kmalloc Hi Cong On Sat, Jan 30, 2016 at 6:46 AM, Eric Dumazet <eric.dumazet@...il.com> wrote: > On Fri, 2016-01-29 at 11:24 -0800, Cong Wang wrote: >> These two functions are called in sendmsg path, and the >> 'len' is passed from user-space, so we should not allow >> malicious users to OOM kernel on purpose. >> >> Reported-by: Dmitry Vyukov <dvyukov@...gle.com> >> Cc: Lauro Ramos Venancio <lauro.venancio@...nbossa.org> >> Cc: Aloisio Almeida Jr <aloisio.almeida@...nbossa.org> >> Cc: Samuel Ortiz <sameo@...ux.intel.com> >> Signed-off-by: Cong Wang <xiyou.wangcong@...il.com> >> --- > > Note that the issue is not OOM the kernel (as the allocation is > attempted even after your patch), but having a way to > spill stack traces in the syslog. > > Acked-by: Eric Dumazet <edumazet@...gle.com> Reviewed-by: Julian Calaby <julian.calaby@...il.com> Thanks, -- Julian Calaby Email: julian.calaby@...il.com Profile: http://www.google.com/profiles/julian.calaby/
Powered by blists - more mailing lists