lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 14 Dec 2019 22:52:01 -0800 From: syzbot <syzbot+4a39a025912b265cacef@...kaller.appspotmail.com> To: a@...table.cc, adilger.kernel@...ger.ca, afd@...com, b.a.t.m.a.n@...ts.open-mesh.org, chris@...a.com.au, davem@...emloft.net, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org, mareklindner@...mailbox.ch, netdev@...r.kernel.org, pali.rohar@...il.com, sre@...nel.org, sw@...onwunderlich.de, syzkaller-bugs@...glegroups.com, tytso@....edu Subject: Re: KASAN: use-after-free Read in ext4_xattr_set_entry (2) Hello, syzbot has tested the proposed patch and the reproducer did not trigger crash: Reported-and-tested-by: syzbot+4a39a025912b265cacef@...kaller.appspotmail.com Tested on: commit: dfdeeb41 Merge branch 'tt/misc' into dev git tree: https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git master kernel config: https://syzkaller.appspot.com/x/.config?x=be3b077056d26622 dashboard link: https://syzkaller.appspot.com/bug?extid=4a39a025912b265cacef compiler: gcc (GCC) 9.0.0 20181231 (experimental) patch: https://syzkaller.appspot.com/x/patch.diff?x=11b02546e00000 Note: testing is done by a robot and is best-effort only.
Powered by blists - more mailing lists