Re: [PATCH bpf-next 1/2] bpf, test_run: Fix user-memory-access vulnerability for LIVE_FRAMES
From: Toke Høiland-Jørgensen
Date: Mon Jan 05 2026 - 05:49:37 EST
KaFai Wan <kafai.wan@xxxxxxxxx> writes:
> This fix reverts to the original version and ensures data_hard_start
> correctly points to the xdp_frame structure, eliminating the security
> risk.
This is wrong. We should just be checking the meta_len on input to
account for the size of xdp_frame. I'll send a patch.
-Toke