Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2407465pxa; Mon, 3 Aug 2020 15:41:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJze2L4nDmZJQK9leXyqpkGLcaM+efbqvSdQDBnKw8+eOPzyk/AcAe79oDQWl4aeRIiQsIiG X-Received: by 2002:aa7:d809:: with SMTP id v9mr17875821edq.94.1596494484180; Mon, 03 Aug 2020 15:41:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596494484; cv=none; d=google.com; s=arc-20160816; b=tVIg7fGDoNWTaPrbQ6t70A2bFHx2o7xSBNJwYswE6N5LOCyN6t4Jc99QoNWFD4t0yq 2lxV3c/lDOlrC1iiqxx/xL2wlXk+BopMZTmYnmxHVN7UzljAYyMt8bufA+ZzWYxUOzkx kOC61D1nBVc74SNJxBe9YQPmmLLS8HpjcVy41I7c7G4j2qjHsjtW/A2nEF8cFuYCb6Fl /n/k6J8Wk+gWKCcaO99eLBq8CAin/hw/oHJgK/tA7v070RxMKzTZzM4qW736g16QsgAz 6uQk6rn/U43tmYNHFA758uq7sjdK5cLF0ExsCwtzVZ0VtcoVF4h3BlnH/oTop801lH3w XH1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=qq/OoGqAWgSNxLVy8asfjdh45pV617fREiK/m3ZEZvc=; b=AZ3okat2Cg9MEo6TOeCYcWkGZjzWT0VqwKIIJwcPeMraPWLfmzxuiekG/Jvx5VWgvw 69n/4sNFMmTvXjKzttj5uSYRcg84pfiOXDLqnYmz+Xrr0Ma0a9cthE0jTvfYhjXXmv6K n/hywmn23X7HWZyDjvROezdoZzjOzSaALVjsCD01LrneONq4m5HK+zrhG0mjgrMHTWrz jW2VMqZOMiAJxNZ/wa/4Af0snDxYSRpCxhAX1HveJhiBuJ+Wbq3gmA8mqGWiO3zmL3Qo +eL7xhCUAFDoDGhnev2VGZP9fTII84S2aCHcfht0iGHbZAFja0kaTctH3GHrWxQaHhaE 5keQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=QG4ZErxq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t23si4387174edc.163.2020.08.03.15.41.01; Mon, 03 Aug 2020 15:41:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=QG4ZErxq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728793AbgHCWjr (ORCPT + 99 others); Mon, 3 Aug 2020 18:39:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52252 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726276AbgHCWjr (ORCPT ); Mon, 3 Aug 2020 18:39:47 -0400 Received: from mail-qk1-x741.google.com (mail-qk1-x741.google.com [IPv6:2607:f8b0:4864:20::741]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3846FC06174A; Mon, 3 Aug 2020 15:39:47 -0700 (PDT) Received: by mail-qk1-x741.google.com with SMTP id g26so36787624qka.3; Mon, 03 Aug 2020 15:39:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=qq/OoGqAWgSNxLVy8asfjdh45pV617fREiK/m3ZEZvc=; b=QG4ZErxqYyI5iREiUFB1jMDEgaclsLXRd3qwNHgPxJzT+aVI+210+43VgEexTxw6IX y74sgnsPzSLxLnp0of6tip9TkJMrGZTLca4BZPcGmV4QSuxBHbQ8KuZD2HKe2n/FwK0d yiyFxmA6bZvuGva3RjPOo+IQtbABTApfwxzEa5UTTNDvgkxhj6+iH2Vtw39VhLRndJr+ vuCoE9wIGSE6oGCunTqahhgLIg/m77qW/XGZQv0yV7j4hrkv207z9NIYQkz6McOWqQzV mORR1fIYynddz6vh2HAmDPzlVdz6aEpFFt2K8j589b00+45j5QZ9vWmK2swulkUEe5cO f1+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=qq/OoGqAWgSNxLVy8asfjdh45pV617fREiK/m3ZEZvc=; b=RMZ9XlL9cETbY942TaDmRcPq6CKWYDlgMMOY/lKAtL3BvPeGQwwUk8Tcdfi2vPJRqW wd1k9ilhrF+BFT+Ihk0u3iaHEkoSpUEk9fczpHmkVKq6YAtQKYEuecvVz3U7/+v0+yIW eFhovPOPQvR9DBD7O5LOcGxOBU0B100y1YFrDF8gemhxiuw3vU2Lcldv4DVqryQLLTcO qz5t1B8cNSv4YHaI45RS5RB7/9N9RuUYHIUVUkhOPrdnIcdyUqV9NzbUGhZdLJw3Wmns 9T9IXzeG/CbyqZDS1UwqWGJEW7YM+rWvO0hao50FcPDUtBB3Ii1P/IfPbAiLmBkCHFl8 MIXg== X-Gm-Message-State: AOAM531whge0IvDV1g+NLBkQTOdgm4o1Fg3KbKe10wXdjsnTlKOyJ6Ap k5VnMUW4ZlZJigrJ9Z5qrNoMJnA= X-Received: by 2002:a37:8047:: with SMTP id b68mr17229339qkd.299.1596494386464; Mon, 03 Aug 2020 15:39:46 -0700 (PDT) Received: from PWN (146-115-88-66.s3894.c3-0.sbo-ubr1.sbo.ma.cable.rcncustomer.com. [146.115.88.66]) by smtp.gmail.com with ESMTPSA id u37sm24292165qtj.47.2020.08.03.15.39.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 03 Aug 2020 15:39:46 -0700 (PDT) Date: Mon, 3 Aug 2020 18:39:43 -0400 From: Peilin Ye To: David Miller Cc: pshelar@ovn.org, kuba@kernel.org, dan.carpenter@oracle.com, arnd@arndb.de, gregkh@linuxfoundation.org, linux-kernel-mentees@lists.linuxfoundation.org, netdev@vger.kernel.org, dev@openvswitch.org, linux-kernel@vger.kernel.org Subject: Re: [Linux-kernel-mentees] [PATCH net] openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() Message-ID: <20200803223943.GA279188@PWN> References: <20200731044838.213975-1-yepeilin.cs@gmail.com> <20200803.151038.440269686968773655.davem@davemloft.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200803.151038.440269686968773655.davem@davemloft.net> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 03, 2020 at 03:10:38PM -0700, David Miller wrote: > From: Peilin Ye > Date: Fri, 31 Jul 2020 00:48:38 -0400 > > > ovs_ct_put_key() is potentially copying uninitialized kernel stack memory > > into socket buffers, since the compiler may leave a 3-byte hole at the end > > of `struct ovs_key_ct_tuple_ipv4` and `struct ovs_key_ct_tuple_ipv6`. Fix > > it by initializing `orig` with memset(). > > > > Cc: stable@vger.kernel.org > > Please don't CC: stable for networking fixes. Sorry, I didn't know about that. > > Fixes: 9dd7f8907c37 ("openvswitch: Add original direction conntrack tuple to sw_flow_key.") > > Suggested-by: Dan Carpenter > > Signed-off-by: Peilin Ye > > Applied and queued up for -stable, thank you. Thank you for reviewing the patch! Peilin Ye