[PATCH] RDS: null pointer dereference in rds_atomic_free_op

2018-01-03 Thread simo . ghannam
From: Mohamed Ghannam set rm->atomic.op_active to 0 when rds_pin_pages() fails or the user supplied address is invalid, this prevents a NULL pointer usage in rds_atomic_free_op() Signed-off-by: Mohamed Ghannam --- net/rds/rdma.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/rds/rdma.

[PATCH] RDS: Heap OOB write in rds_message_alloc_sgs()

2018-01-02 Thread simo . ghannam
From: Mohamed Ghannam When args->nr_local is 0, nr_pages gets also 0 due some size calculation via rds_rm_size(), which is later used to allocate pages for DMA, this bug produces a heap Out-Of-Bound write access to a specific memory region. Signed-off-by: Mohamed Ghannam --- net/rds/rdma.c | 3

[PATCH] net: ipv4: fix for a race condition in raw_sendmsg

2017-12-09 Thread simo . ghannam
From: Mohamed Ghannam inet->hdrincl is racy, and could lead to uninitialized stack pointer usage, so its value should be read only once. Signed-off-by: Mohamed Ghannam --- net/ipv4/raw.c | 15 ++- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/net/ipv4/raw.c b/net/i

[PATCH] dccp: CVE-2017-8824: use-after-free in DCCP code

2017-12-05 Thread simo . ghannam
From: Mohamed Ghannam Whenever the sock object is in DCCP_CLOSED state, dccp_disconnect() must free dccps_hc_tx_ccid and dccps_hc_rx_ccid and set to NULL. Signed-off-by: Mohamed Ghannam --- net/dccp/proto.c | 5 + 1 file changed, 5 insertions(+) diff --git a/net/dccp/proto.c b/net/dccp/pr

[PATCH] dccp: CVE-2017-8824: use-after-free in DCCP code

2017-12-04 Thread simo . ghannam
From: Mohamed Ghannam Whenever the sock object is in DCCP_CLOSED state, dccp_disconnect() must free dccps_hc_tx_ccid and dccps_hc_rx_ccid and set to NULL. Signed-off-by: Mohamed Ghannam --- net/dccp/proto.c | 5 + 1 file changed, 5 insertions(+) diff --git a/net/dc

[PATCH] dccp: CVE-2017-8824: use-after-free in DCCP code

2017-12-04 Thread simo . ghannam
From: Mohamed Ghannam Whenever the sock object is in DCCP_CLOSED state, dccp_disconnect() must free dccps_hc_tx_ccid and dccps_hc_rx_ccid and set to NULL. Signed-off-by: Mohamed Ghannam --- net/dccp/proto.c | 5 + 1 file changed, 5 insertions(+) diff --git a/net/dccp/pro

[PATCH] tcp/dccp: CVE-2017-8824: use-after-free in DCCP code

2017-12-04 Thread simo . ghannam
From: Mohamed Ghannam Whenever the sock object is in DCCP_CLOSED state, dccp_disconnect() must free dccps_hc_tx_ccid and dccps_hc_rx_ccid and set to NULL. Signed-off-by: Mohamed Ghannam --- net/dccp/proto.c | 4 1 file changed, 4 insertions(+) diff --git a/net/dccp/prot