lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <tencent_884D1773977426D9D3600371696883B6A405@qq.com> Date: Wed, 22 Nov 2023 08:50:56 +0800 From: Edward Adam Davis <eadavis@...com> To: syzbot+e2c932aec5c8a6e1d31c@...kaller.appspotmail.com Cc: andrii@...nel.org, ast@...nel.org, bpf@...r.kernel.org, daniel@...earbox.net, davem@...emloft.net, edumazet@...gle.com, haoluo@...gle.com, hawk@...nel.org, john.fastabend@...il.com, jolsa@...nel.org, kpsingh@...nel.org, kuba@...nel.org, linux-kernel@...r.kernel.org, linux-trace-kernel@...r.kernel.org, martin.lau@...nel.org, martin.lau@...ux.dev, mhiramat@...nel.org, netdev@...r.kernel.org, pabeni@...hat.com, rostedt@...dmis.org, sdf@...gle.com, song@...nel.org, syzkaller-bugs@...glegroups.com, yhs@...com, yonghong.song@...ux.dev Subject: [PATCH net] bpf: test_run: fix WARNING in format_decode Confirm that skb->len is not 0 to ensure that skb length is valid. Fixes: 114039b34201 ("bpf: Move skb->len == 0 checks into __bpf_redirect") Reported-by: syzbot+e2c932aec5c8a6e1d31c@...kaller.appspotmail.com Signed-off-by: Edward Adam Davis <eadavis@...com> --- net/bpf/test_run.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/bpf/test_run.c b/net/bpf/test_run.c index c9fdcc5cdce1..78258a822a5c 100644 --- a/net/bpf/test_run.c +++ b/net/bpf/test_run.c @@ -845,6 +845,9 @@ static int convert___skb_to_skb(struct sk_buff *skb, struct __sk_buff *__skb) { struct qdisc_skb_cb *cb = (struct qdisc_skb_cb *)skb->cb; + if (!skb->len) + return -EINVAL; + if (!__skb) return 0; -- 2.26.1
Powered by blists - more mailing lists