lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 14 Feb 2018 16:28:13 +0100 From: Dmitry Vyukov <dvyukov@...gle.com> To: Sowmini Varadhan <sowmini.varadhan@...cle.com> Cc: syzbot <syzbot+bbd8e9a06452cc48059b@...kaller.appspotmail.com>, David Miller <davem@...emloft.net>, LKML <linux-kernel@...r.kernel.org>, linux-rdma@...r.kernel.org, netdev <netdev@...r.kernel.org>, rds-devel@....oracle.com, Santosh Shilimkar <santosh.shilimkar@...cle.com>, syzkaller-bugs@...glegroups.com Subject: Re: KASAN: use-after-free Read in rds_tcp_tune On Wed, Feb 14, 2018 at 4:21 PM, Sowmini Varadhan <sowmini.varadhan@...cle.com> wrote: > On (02/14/18 16:11), Dmitry Vyukov wrote: >> >> Hi Sowmini, >> >> Was this ever fixed? What's the fix? This still hangs as open. Please >> provide "syz fix" tag. > > Are you still seeing this problem? > > I had expected that the changes around rds_destroy_pending - see commit > ebeeb1ad9b8a - would have taken care of this (note that ebeeb1ad9b8a > refactors/updates 3db6e0d172c9) but those fixes were done by inspection > only. In other words, I was never able to reproduce this, so we may > still have missed some race condition. syzbot is probably not seeing this problem. However if you don't add the Reported-by tag to commit, nor provide syz fix tag, it will consider it as "open". One consequence of this is that it is still on our radars. Another consequence is that syzbot will never report bugs in rds_tcp_tune ever again as it thinks that it's the same known bug, so no point in bothering anybody.
Powered by blists - more mailing lists