lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20190104.130653.986135602696070698.davem@davemloft.net> Date: Fri, 04 Jan 2019 13:06:53 -0800 (PST) From: David Miller <davem@...emloft.net> To: sbrivio@...hat.com Cc: syzbot+4ad25edc7a33e4ab91e0@...kaller.appspotmail.com, willemdebruijn.kernel@...il.com, eric.dumazet@...il.com, kuznet@....inr.ac.ru, yoshfuji@...ux-ipv6.org, dvyukov@...gle.com, syzkaller-bugs@...glegroups.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org Subject: Re: [PATCH net 0/2] Fix two further potential unbounded recursions in GUE error handlers From: Stefano Brivio <sbrivio@...hat.com> Date: Thu, 3 Jan 2019 21:43:33 +0100 > Patch 1/2 takes care of preventing the issue fixed by commit 11789039da53 > ("fou: Prevent unbounded recursion in GUE error handler") also with > UDP-Lite payloads -- I just realised this might happen from a syzbot > report. > > Patch 2/2 fixes the issue for both UDP and UDP-Lite on IPv6, which I also > forgot to deal with in that same commit. Series applied, thanks.
Powered by blists - more mailing lists