Re: [PATCH] ipv4: Fix potential Spectre v1 vulnerability

2018-12-10 Thread Gustavo A. R. Silva
On 12/10/18 2:11 PM, David Miller wrote: Cc: sta...@vger.kernel.org Signed-off-by: Gustavo A. R. Silva Applied and queued up for -stable. Please do not CC: stable for networking bug fixes, thank you. OK. I've got it. Thanks -- Gustavo

Re: [PATCH] ipv4: Fix potential Spectre v1 vulnerability

2018-12-10 Thread David Miller
From: "Gustavo A. R. Silva" Date: Mon, 10 Dec 2018 12:41:24 -0600 > vr.vifi is indirectly controlled by user-space, hence leading to > a potential exploitation of the Spectre variant 1 vulnerability. > > This issue was detected with the help of Smatch: > > net/ipv4/ipmr.c:1616 ipmr_ioctl() warn

[PATCH] ipv4: Fix potential Spectre v1 vulnerability

2018-12-10 Thread Gustavo A. R. Silva
vr.vifi is indirectly controlled by user-space, hence leading to a potential exploitation of the Spectre variant 1 vulnerability. This issue was detected with the help of Smatch: net/ipv4/ipmr.c:1616 ipmr_ioctl() warn: potential spectre issue 'mrt->vif_table' [r] (local cap) net/ipv4/ipmr.c:1690