lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ee964c66-da56-def6-9525-6d960ab9487a@I-love.SAKURA.ne.jp> Date: Fri, 29 Nov 2019 18:39:49 +0900 From: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp> To: syzbot <syzbot+131d2229316b7012ac06@...kaller.appspotmail.com>, syzkaller-bugs@...glegroups.com Cc: b.a.t.m.a.n@...ts.open-mesh.org, jmorris@...ei.org, linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org, netdev@...r.kernel.org, serge@...lyn.com, Casey Schaufler <casey@...aufler-ca.com> Subject: Re: general protection fault in smack_socket_sendmsg (2) On 2019/11/29 9:05, syzbot wrote: > rxrpc_send_keepalive+0x254/0x3c0 net/rxrpc/output.c:655 Again net/rxrpc/output.c:655 #syz dup: KMSAN: use-after-free in rxrpc_send_keepalive
Powered by blists - more mailing lists