lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20170501.235610.564976046138352257.davem@davemloft.net> Date: Mon, 01 May 2017 23:56:10 -0400 (EDT) From: David Miller <davem@...emloft.net> To: ast@...com Cc: daniel@...earbox.net, netdev@...r.kernel.org Subject: bpf_test_finish() It dereferences a user pointer: static int bpf_test_finish(union bpf_attr __user *uattr, const void *data, u32 size, u32 retval, u32 duration) { void __user *data_out = u64_to_user_ptr(uattr->test.data_out); ^^^^^^^^^^^^^^^^^^^^ Which of course doesn't work so well :-) I really wish that didn't silently work on x86/x86_64. You're going to have to do a "get_user(&uattr->test.data_out)"
Powered by blists - more mailing lists