lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 3 Nov 2022 12:03:41 +0100 From: Florian Westphal <fw@...len.de> To: Ziyang Xuan <william.xuanziyang@...wei.com> Cc: pablo@...filter.org, kadlec@...filter.org, fw@...len.de, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, netfilter-devel@...r.kernel.org, coreteam@...filter.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] netfilter: nfnetlink: fix potential dead lock in nfnetlink_rcv_msg() Ziyang Xuan <william.xuanziyang@...wei.com> wrote: > When type is NFNL_CB_MUTEX and -EAGAIN error occur in nfnetlink_rcv_msg(), > it does not execute nfnl_unlock(). That would trigger potential dead lock. > > Fixes: 50f2db9e368f ("netfilter: nfnetlink: consolidate callback types") Applied to nf:testing, thanks.
Powered by blists - more mailing lists