lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ZFJlLaj6Qqa7Pc28@t14s.localdomain> Date: Wed, 3 May 2023 10:44:13 -0300 From: Marcelo Ricardo Leitner <marcelo.leitner@...il.com> To: Gavrilov Ilia <Ilia.Gavrilov@...otecs.ru> Cc: Simon Horman <simon.horman@...igine.com>, Neil Horman <nhorman@...driver.com>, Xin Long <lucien.xin@...il.com>, "David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, "linux-sctp@...r.kernel.org" <linux-sctp@...r.kernel.org>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "lvc-project@...uxtesting.org" <lvc-project@...uxtesting.org> Subject: Re: [PATCH net v4] sctp: fix a potential OOB access in sctp_sched_set_sched() On Wed, May 03, 2023 at 01:37:59PM +0000, Gavrilov Ilia wrote: > The 'sched' index value must be checked before accessing an element > of the 'sctp_sched_ops' array. Otherwise, it can lead to OOB access. > > Note that it's harmless since the 'sched' parameter is checked before > calling 'sctp_sched_set_sched'. > > Found by InfoTeCS on behalf of Linux Verification Center > (linuxtesting.org) with SVACE. > > Reviewed-by: Xin Long <lucien.xin@...il.com> > Reviewed-by: Simon Horman <simon.horman@...igine.com> > Signed-off-by: Ilia.Gavrilov <Ilia.Gavrilov@...otecs.ru> Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@...il.com> Thx!
Powered by blists - more mailing lists