lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <7bea2244-dc28-4c67-b515-739b8b7d7901@redhat.com>
Date: Thu, 4 Dec 2025 11:04:18 +0100
From: Paolo Abeni <pabeni@...hat.com>
To: Wang Liang <wangliang74@...wei.com>,
 Deepanshu Kartikey <kartikey406@...il.com>, davem@...emloft.net,
 edumazet@...gle.com, kuba@...nel.org, horms@...nel.org
Cc: linux-hams@...r.kernel.org, netdev@...r.kernel.org,
 linux-kernel@...r.kernel.org,
 syzbot+d7abc36bbbb6d7d40b58@...kaller.appspotmail.com
Subject: Re: [PATCH] net: netrom: fix memory leak in nr_output()

On 11/29/25 5:01 AM, Wang Liang wrote:
> 在 2025/11/29 11:42, Deepanshu Kartikey 写道:
>> When nr_output() fragments a large packet, it calls sock_alloc_send_skb()
> 
> Hi!
> 
> Coincidentally, we both are working on this issue simultaneously.
> 
>  From the syz test requests:
> https://syzkaller.appspot.com/bug?extid=d7abc36bbbb6d7d40b58
> 
> I sended the test patch earlier, only a dozen seconds...

FTR and future similar cases, we don't have the send time information
handy. Instead we use the timestamp as available on patchwork.

In this specific case Deepanshu's patch landed first, but does not apply
cleanly, so I'll apply Wang's one.

Cheers,

Paolo


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ