lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 22 Dec 2013 21:44:45 +0100 From: Kristian Nielsen <knielsen@...elsen-hq.org> To: Gu Zheng <guz.fnst@...fujitsu.com> Cc: Dave Jones <davej@...hat.com>, Benjamin LaHaise <bcrl@...ck.org>, Kent Overstreet <kmo@...erainc.com>, Linux Kernel <linux-kernel@...r.kernel.org>, Sasha Levin <sasha.levin@...cle.com> Subject: Re: GPF in aio_migratepage Gu Zheng <guz.fnst@...fujitsu.com> writes: > This issue seems like a problem that has been fixed yet: > http://article.gmane.org/gmane.linux.kernel.aio.general/3741/match=potential+use+after+free+aio%5fmigratepage > commit 5e9ae2e5da0beb93f8557fc92a8f4fbc05ea448f > aio: fix use-after-free in aio_migratepage > So I think maybe you can run with latest Linus' tree or 3.13-rc4 to > check whether this issue still appears. Hm. I checked that thread, and as far as I can see, that patch was already included in the tree I hit the BUG in (3.13-rc1): http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e9ae2e5da0beb93f8557fc92a8f4fbc05ea448f There are other changes in that area since 3.13-rc1 though. Anyway, I am now running with 3.13-rc4 and will report if I see anything. Given that I do not have any way to reproduce (I only ever saw this once), this seems the best that can be done for now. Thanks for following up on this! - Kristian. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists