lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 05 Sep 2022 13:20:14 +0000 From: patchwork-bot+netdevbpf@...nel.org To: David Lebrun <dav.lebrun@...il.com> Cc: netdev@...r.kernel.org, edumazet@...gle.com, wmliang.tw@...il.com, dlebrun@...gle.com Subject: Re: [PATCH net] ipv6: sr: fix out-of-bounds read when setting HMAC data. Hello: This patch was applied to netdev/net.git (master) by David S. Miller <davem@...emloft.net>: On Fri, 2 Sep 2022 10:45:06 +0100 you wrote: > From: David Lebrun <dlebrun@...gle.com> > > The SRv6 layer allows defining HMAC data that can later be used to sign IPv6 > Segment Routing Headers. This configuration is realised via netlink through > four attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and > SEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual > length of the SECRET attribute, it is possible to provide invalid combinations > (e.g., secret = "", secretlen = 64). This case is not checked in the code and > with an appropriately crafted netlink message, an out-of-bounds read of up > to 64 bytes (max secret length) can occur past the skb end pointer and into > skb_shared_info: > > [...] Here is the summary with links: - [net] ipv6: sr: fix out-of-bounds read when setting HMAC data. https://git.kernel.org/netdev/net/c/84a53580c5d2 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists