lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4f4ce7f6-a9df-b898-8de5-05dcbf15b095@gmail.com> Date: Thu, 14 Feb 2019 12:04:47 -0700 From: David Ahern <dsahern@...il.com> To: Peter Oskolkov <posk@...gle.com>, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, netdev@...r.kernel.org Cc: Peter Oskolkov <posk@...k.io>, Willem de Bruijn <willemb@...gle.com> Subject: Re: [PATCH bpf-next v2] bpf: fix memory leak in bpf_lwt_xmit_reroute On 2/14/19 11:39 AM, Peter Oskolkov wrote: > On error the skb should be freed. Tested with diff/steps > provided by David Ahern. > > v2: surface routing errors to the user instead of a generic EINVAL, > as suggested by David Ahern. > > Reported-by: David Ahern <dsahern@...il.com> > Fixes: 3bd0b15281af ("bpf: add handling of BPF_LWT_REROUTE to lwt_bpf.c") > Signed-off-by: Peter Oskolkov <posk@...gle.com> > --- > net/core/lwt_bpf.c | 29 ++++++++++++++++++++--------- > 1 file changed, 20 insertions(+), 9 deletions(-) > Reviewed-by: David Ahern <dsahern@...il.com>
Powered by blists - more mailing lists