lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 21 Jan 2020 18:45:43 -0800 From: Alexei Starovoitov <alexei.starovoitov@...il.com> To: Alexei Starovoitov <ast@...nel.org> Cc: "David S. Miller" <davem@...emloft.net>, Daniel Borkmann <daniel@...earbox.net>, Network Development <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>, Kernel Team <kernel-team@...com> Subject: Re: [PATCH bpf-next] bpf: Fix error path under memory pressure On Tue, Jan 21, 2020 at 6:42 PM Alexei Starovoitov <ast@...nel.org> wrote: > > Restore the 'if (env->cur_state)' check that was incorrectly removed during > code move. Under memory pressure env->cur_state can be freed and zeroed inside > do_check(). Hence the check is necessary. > > Fixes: 51c39bb1d5d1 ("bpf: Introduce function-by-function verification") > Signed-off-by: Alexei Starovoitov <ast@...nel.org> Forgot to add: Reported-by: syzbot+b296579ba5015704d9fa@...kaller.appspotmail.com Daniel, pls add while applying.
Powered by blists - more mailing lists