lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240208144224.438146-1-r.smirnov@omp.ru>
Date: Thu, 8 Feb 2024 14:42:23 +0000
From: Roman Smirnov <r.smirnov@....ru>
To: <stable@...r.kernel.org>, Greg Kroah-Hartman <gregkh@...uxfoundation.org>
CC: Roman Smirnov <r.smirnov@....ru>, Ryusuke Konishi
	<konishi.ryusuke@...il.com>, <linux-nilfs@...r.kernel.org>,
	<linux-kernel@...r.kernel.org>, Alexey Khoroshilov <khoroshilov@...ras.ru>,
	<lvc-project@...uxtesting.org>, Sergey Shtylyov <s.shtylyov@....ru>, Karina
 Yankevich <k.yankevich@....ru>, Andrey Rusalin <a.rusalin@....ru>, Sergey
 Yudin <s.yudin@....ru>, Valentin Perevozchikov <v.perevozchikov@....ru>
Subject: [PATCH 5.10/5.15/6.1 0/1] nilfs2: fix WARNING in nilfs_dat_prepare_end()

Syzkaller reports WARNING in nilfs_dat_prepare_end() in 5.10, 5.15 and 6.1
stable releases. The problem has been fixed in upstream:
https://syzkaller.appspot.com/bug?extid=5d5d25f90f195a3cfcb4

The problem can also be fixed in versions 5.10, 5.15 and 6.1 by the
following patch.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Link: https://syzkaller.appspot.com/bug?extid=325e6b0a1e7cf9035cc0
Link: https://syzkaller.appspot.com/bug?extid=bebf30d67ea2569f0fd3

Ryusuke Konishi (1):
  nilfs2: replace WARN_ONs for invalid DAT metadata block requests

 fs/nilfs2/dat.c | 27 +++++++++++++++++----------
 1 file changed, 17 insertions(+), 10 deletions(-)

-- 
2.34.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ