lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 07 Jul 2018 22:11:46 +0900 (KST) From: David Miller <davem@...emloft.net> To: lorenzo@...gle.com Cc: netdev@...r.kernel.org, astrachan@...gle.com, subashab@...eaurora.org, eric.dumazet@...il.com, dsa@...ulusnetworks.com Subject: Re: [PATCH net] net: diag: Don't double-free TCP_NEW_SYN_RECV sockets in tcp_abort From: Lorenzo Colitti <lorenzo@...gle.com> Date: Sat, 7 Jul 2018 16:31:40 +0900 > Tested: passes Android sock_diag_test.py, which exercises this codepath If this Android test case exercises this path, why didn't it trigger the double free and thus cause this bug to be found much sooner? Just curious.
Powered by blists - more mailing lists