lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 14 Jun 2018 01:01:44 +0200 From: Daniel Borkmann <daniel@...earbox.net> To: syzbot <syzbot+567faa843005dda30737@...kaller.appspotmail.com>, ast@...nel.org, davem@...emloft.net, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, syzkaller-bugs@...glegroups.com Subject: Re: KASAN: slab-out-of-bounds Read in bpf_skb_change_head On 06/14/2018 12:17 AM, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit: 75d4e704fa8d netdev-FAQ: clarify DaveM's position for stab.. > git tree: bpf-next > console output: https://syzkaller.appspot.com/x/log.txt?x=16bd21af800000 > kernel config: https://syzkaller.appspot.com/x/.config?x=a601a80fec461d44 > dashboard link: https://syzkaller.appspot.com/bug?extid=567faa843005dda30737 > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=1039185f800000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=11e85cff800000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+567faa843005dda30737@...kaller.appspotmail.com #syz fix: bpf: reject passing modified ctx to helper functions
Powered by blists - more mailing lists