From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2329C77B7F for ; Thu, 4 May 2023 01:49:36 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229559AbjEDBte (ORCPT ); Wed, 3 May 2023 21:49:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45864 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229441AbjEDBtc (ORCPT ); Wed, 3 May 2023 21:49:32 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F41A5BD; Wed, 3 May 2023 18:49:30 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 87B94611FA; Thu, 4 May 2023 01:49:30 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6CB1FC433D2; Thu, 4 May 2023 01:49:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1683164969; bh=6SyTKbVcajyYbNLJTfLkhCT7g/RGQ6mt+51ZNxG89JY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=HkCNopdxlGhmaXqy6jbwrBacnksKw0nWAGpajVw5/5AP/0p/6PgFN9Fqn8uDP/c8q uP9h7lQQgC67pEAH9Q6AiqlhqRAkcfHCwGqqv6zAMHfIc2hbb4Gi1bXuUTCeSQ1MOP WOjHnPXVfoZaGkRQtCDwu3mIh4BlMBfDuQWdT3fVAMbAXYTkKoG0PnbLz9FtHMw7UY p0M9WTq0y4b1BDNwALKhlhNvZVLnn3TmoC8rNwNRJ76fPGnSQn5H9S7QHQkF+RZ1mT 1V67W0SqP2swwDd1SeIkSw2jQqILJclB6onfOzG2RFWzakvs3CKBoA/6ERt92PPXgt PTSZAX3sVrhew== Date: Wed, 3 May 2023 18:49:28 -0700 From: Jakub Kicinski To: Gavrilov Ilia Cc: Marcelo Ricardo Leitner , Simon Horman , Neil Horman , Xin Long , "David S. Miller" , Eric Dumazet , Paolo Abeni , "linux-sctp@vger.kernel.org" , "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "lvc-project@linuxtesting.org" Subject: Re: [PATCH net v4] sctp: fix a potential OOB access in sctp_sched_set_sched() Message-ID: <20230503184928.458eb0da@kernel.org> In-Reply-To: <20230503133752.4176720-1-Ilia.Gavrilov@infotecs.ru> References: <20230503133752.4176720-1-Ilia.Gavrilov@infotecs.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 3 May 2023 13:37:59 +0000 Gavrilov Ilia wrote: > The 'sched' index value must be checked before accessing an element > of the 'sctp_sched_ops' array. Otherwise, it can lead to OOB access. > > Note that it's harmless since the 'sched' parameter is checked before > calling 'sctp_sched_set_sched'. Not a fix, so it needs to wait for net-next to open, see below. When you repost please do so separately, not in the existing thread. ## Form letter - net-next-closed The merge window for v6.3 has begun and therefore net-next is closed for new drivers, features, code refactoring and optimizations. We are currently accepting bug fixes only. Please repost when net-next reopens after May 8th. RFC patches sent for review only are obviously welcome at any time. See: https://www.kernel.org/doc/html/next/process/maintainer-netdev.html#development-cycle -- pw-bot: defer