lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 19 Jan 2022 14:20:10 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Krzysztof Kozlowski <krzysztof.kozlowski@...onical.com> Cc: davem@...emloft.net, kuba@...nel.org, linux-nfc@...ts.01.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v2 0/1] nfc: llcp: a fix after syzbot report Hello: This patch was applied to netdev/net.git (master) by David S. Miller <davem@...emloft.net>: On Wed, 19 Jan 2022 08:48:15 +0100 you wrote: > Hi, > > Syzbot reported an easily reproducible NULL pointer dereference which I was > struggling to analyze: > https://syzkaller.appspot.com/bug?extid=7f23bcddf626e0593a39 > > Although direct fix is obvious, I could not actually find the exact race > condition scenario leading to it. The patch fixes the issue - at least under > my QEMU - however all this code looks racy, so I have a feeling I am plumbing > one leak without fixing root cause. > > [...] Here is the summary with links: - [v2,1/1] nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() https://git.kernel.org/netdev/net/c/dded08927ca3 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists