lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 10 Sep 2021 11:50:48 +0200 From: Steffen Klassert <steffen.klassert@...unet.com> To: Pavel Skripkin <paskripkin@...il.com> CC: <herbert@...dor.apana.org.au>, <davem@...emloft.net>, <kuba@...nel.org>, <netdev@...r.kernel.org>, <linux-kernel@...r.kernel.org>, <syzbot+b2be9dd8ca6f6c73ee2d@...kaller.appspotmail.com> Subject: Re: [PATCH] net: xfrm: fix shift-out-of-bounds in xfrm_get_default On Thu, Sep 02, 2021 at 10:04:00PM +0300, Pavel Skripkin wrote: > Syzbot hit shift-out-of-bounds in xfrm_get_default. The problem was in > missing validation check for user data. > > up->dirmask comes from user-space, so we need to check if this value > is less than XFRM_USERPOLICY_DIRMASK_MAX to avoid shift-out-of-bounds bugs. > > Fixes: 2d151d39073a ("xfrm: Add possibility to set the default to block if we have no policy") > Reported-and-tested-by: syzbot+b2be9dd8ca6f6c73ee2d@...kaller.appspotmail.com > Signed-off-by: Pavel Skripkin <paskripkin@...il.com> Applied, thanks Pavel!
Powered by blists - more mailing lists