lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20170508114918.GB9813@secunet.com> Date: Mon, 8 May 2017 13:49:19 +0200 From: Steffen Klassert <steffen.klassert@...unet.com> To: Andrey Konovalov <andreyknvl@...gle.com> CC: Herbert Xu <herbert@...dor.apana.org.au>, "David S. Miller" <davem@...emloft.net>, netdev <netdev@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, Dmitry Vyukov <dvyukov@...gle.com>, "Kostya Serebryany" <kcc@...gle.com>, Eric Dumazet <edumazet@...gle.com>, Cong Wang <xiyou.wangcong@...il.com>, syzkaller <syzkaller@...glegroups.com> Subject: Re: net/key: slab-out-of-bounds in pfkey_compile_policy On Fri, May 05, 2017 at 02:18:01PM +0200, Andrey Konovalov wrote: > On Fri, May 5, 2017 at 11:11 AM, Steffen Klassert > <steffen.klassert@...unet.com> wrote: > > On Tue, May 02, 2017 at 06:45:03PM +0200, Andrey Konovalov wrote: > >> Hi, > >> > >> I've got the following error report while fuzzing the kernel with syzkaller. > >> > >> On commit d3b5d35290d729a2518af00feca867385a1b08fa (4.11). > >> > >> A reproducer and .config are attached. > >> > >> ================================================================== > >> BUG: KASAN: slab-out-of-bounds in pfkey_compile_policy+0x8e6/0xd40 at > >> addr ffff88006701f798 > >> Read of size 1280 by task a.out/4181 > > > > > > This bug was introduced twelve years ago... > > > > This patch is based just on code review, I don't have an option to > > function test this. But I see that we now exit with -EINVAL before the > > memcpy that causes the slab-out-of-bounds when using your reproducer, > > so it should at least fix the bug. > > Hi Steffen, > > This patch fixes the issue for me. > > Thanks! > > Tested-by: Andrey Konovalov <andreyknvl@...gle.com> Patch is now applied to the ipsec tree. Thanks for reporting and testing!
Powered by blists - more mailing lists