lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <7bed2cb9-0e26-f64e-5c4e-6e656f143c78@oracle.com>
Date:   Tue, 27 Aug 2019 11:18:50 +0800
From:   Ka-Cheong Poon <ka-cheong.poon@...cle.com>
To:     David Miller <davem@...emloft.net>
Cc:     netdev@...r.kernel.org, santosh.shilimkar@...cle.com,
        rds-devel@....oracle.com
Subject: Re: [PATCH net-next] net/rds: Fix info leak in rds6_inc_info_copy()

On 8/25/19 5:20 AM, David Miller wrote:
> From: Ka-Cheong Poon <ka-cheong.poon@...cle.com>
> Date: Wed, 21 Aug 2019 20:18:24 -0700
> 
>> The rds6_inc_info_copy() function has a couple struct members which
>> are leaking stack information.  The ->tos field should hold actual
>> information and the ->flags field needs to be zeroed out.
>>
>> Fixes: 3eb450367d08 ("rds: add type of service(tos) infrastructure")
>> Fixes: b7ff8b1036f0 ("rds: Extend RDS API for IPv6 support")
>> Reported-by: 黄ID蝴蝶 <butterflyhuangxx@...il.com>
>> Signed-off-by: Dan Carpenter <dan.carpenter@...cle.com>
>> Signed-off-by: Ka-Cheong Poon <ka-cheong.poon@...cle.com>
> 
> Why would an info leak bug fix, present in current kernels, be targetted
> at 'net-next' instead of 'net'?
> 
> Please retarget this at 'net' properly, thank you.


Retarget patch sent.  Thanks.


-- 
K. Poon
ka-cheong.poon@...cle.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ