lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <167046901651.21108.4760310811680515367.git-patchwork-notify@kernel.org>
Date:   Thu, 08 Dec 2022 03:10:16 +0000
From:   patchwork-bot+netdevbpf@...nel.org
To:     Marc Kleine-Budde <mkl@...gutronix.de>
Cc:     netdev@...r.kernel.org, davem@...emloft.net, kuba@...nel.org,
        linux-can@...r.kernel.org, kernel@...gutronix.de,
        socketcan@...tkopp.net,
        syzbot+2d7f58292cb5b29eb5ad@...kaller.appspotmail.com,
        harperchen1110@...il.com, stable@...r.kernel.org
Subject: Re: [PATCH net 1/4] can: af_can: fix NULL pointer dereference in
 can_rcv_filter

Hello:

This series was applied to netdev/net.git (master)
by Marc Kleine-Budde <mkl@...gutronix.de>:

On Wed,  7 Dec 2022 11:52:40 +0100 you wrote:
> From: Oliver Hartkopp <socketcan@...tkopp.net>
> 
> Analogue to commit 8aa59e355949 ("can: af_can: fix NULL pointer
> dereference in can_rx_register()") we need to check for a missing
> initialization of ml_priv in the receive path of CAN frames.
> 
> Since commit 4e096a18867a ("net: introduce CAN specific pointer in the
> struct net_device") the check for dev->type to be ARPHRD_CAN is not
> sufficient anymore since bonding or tun netdevices claim to be CAN
> devices but do not initialize ml_priv accordingly.
> 
> [...]

Here is the summary with links:
  - [net,1/4] can: af_can: fix NULL pointer dereference in can_rcv_filter
    https://git.kernel.org/netdev/net/c/0acc442309a0
  - [net,2/4] can: slcan: fix freed work crash
    https://git.kernel.org/netdev/net/c/fb855e9f3b6b
  - [net,3/4] can: can327: flush TX_work on ldisc .close()
    https://git.kernel.org/netdev/net/c/f4a4d121ebec
  - [net,4/4] can: esd_usb: Allow REC and TEC to return to zero
    https://git.kernel.org/netdev/net/c/918ee4911f7a

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ