From patchwork Thu Jan 3 20:43:33 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefano Brivio X-Patchwork-Id: 1020502 Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 43W0M402Nsz9s7h for ; Fri, 4 Jan 2019 07:46:24 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726798AbfACUqT (ORCPT ); Thu, 3 Jan 2019 15:46:19 -0500 Received: from mx1.redhat.com ([209.132.183.28]:42028 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726174AbfACUqS (ORCPT ); Thu, 3 Jan 2019 15:46:18 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 46F4E11532; Thu, 3 Jan 2019 20:46:18 +0000 (UTC) Received: from epycfail.redhat.com (ovpn-200-16.brq.redhat.com [10.40.200.16]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6E406608DD; Thu, 3 Jan 2019 20:46:14 +0000 (UTC) From: Stefano Brivio To: "David S. Miller" Cc: syzbot , Willem de Bruijn , Eric Dumazet , Alexey Kuznetsov , Hideaki YOSHIFUJI , Dmitry Vyukov , syzkaller-bugs@googlegroups.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH net 0/2] Fix two further potential unbounded recursions in GUE error handlers Date: Thu, 3 Jan 2019 21:43:33 +0100 Message-Id: MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Thu, 03 Jan 2019 20:46:18 +0000 (UTC) Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Patch 1/2 takes care of preventing the issue fixed by commit 11789039da53 ("fou: Prevent unbounded recursion in GUE error handler") also with UDP-Lite payloads -- I just realised this might happen from a syzbot report. Patch 2/2 fixes the issue for both UDP and UDP-Lite on IPv6, which I also forgot to deal with in that same commit. Stefano Brivio (2): fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite fou6: Prevent unbounded recursion in GUE error handler net/ipv4/fou.c | 3 ++- net/ipv6/fou6.c | 8 ++++++++ 2 files changed, 10 insertions(+), 1 deletion(-)