lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 22 Jul 2020 15:24:07 -0700 From: syzbot <syzbot+bbc3a11c4da63c1b74d6@...kaller.appspotmail.com> To: andrew@...n.ch, davem@...emloft.net, kuba@...nel.org, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, syzkaller-bugs@...glegroups.com, xiyou.wangcong@...il.com Subject: Re: KASAN: use-after-free Write in __linkwatch_run_queue Hello, syzbot has tested the proposed patch and the reproducer did not trigger any issue: Reported-and-tested-by: syzbot+bbc3a11c4da63c1b74d6@...kaller.appspotmail.com Tested on: commit: 0c473089 bonding: fix register_netdevice() in bond_newlink() git tree: https://github.com/congwang/linux.git net kernel config: https://syzkaller.appspot.com/x/.config?x=dddbcb5a9f4192db dashboard link: https://syzkaller.appspot.com/bug?extid=bbc3a11c4da63c1b74d6 compiler: gcc (GCC) 10.1.0-syz 20200507 Note: testing is done by a robot and is best-effort only.
Powered by blists - more mailing lists