lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <67375681.050a0220.2a2fcc.007d.GAE@google.com>
Date: Fri, 15 Nov 2024 06:11:13 -0800
From: syzbot <syzbot+3a0f6c96e37e347c6ba9@...kaller.appspotmail.com>
To: sudumbha@...co.com
Cc: sudumbha@...co.com, linux-kernel@...r.kernel.org, 
	syzkaller-bugs@...glegroups.com
Subject: Re: [Linux Kernel Bug] memory leak in ubi_attach

> #syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git<http://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git> 8cf0b93919e13d1e8d4466eb4080a4c4d9d66d7b

This crash does not have a reproducer. I cannot test it.

>
> ----------------------------------------------------------------------------------
> diff --git a/mm/slub.c b/mm/slub.c
> index 5b832512044e..dc77128358d8 100644
> --- a/mm/slub.c
> +++ b/mm/slub.c
> @@ -7098,8 +7098,11 @@ static int sysfs_slab_add(struct kmem_cache *s)
>
>     s->kobj.kset = kset;
>     err = kobject_init_and_add(&s->kobj, &slab_ktype, NULL, "%s", name);
> -   if (err)
> +   if (err) {
> +       kfree_const(s->kobj.name);
> +       s->kobj.name = NULL;
>         goto out;
> +   }
>
>     err = sysfs_create_group(&s->kobj, &slab_attr_group);
>     if (err)
> --
> 2.42.0
>
> ----------------------------------------------------------------------------------
>
> Thanks & regards,
> Sudhir
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ