lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <168552602072.29725.226588999597106916.git-patchwork-notify@kernel.org> Date: Wed, 31 May 2023 09:40:20 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Vladislav Efanov <VEfanov@...ras.ru> Cc: willemdebruijn.kernel@...il.com, davem@...emloft.net, dsahern@...nel.org, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, lvc-project@...uxtesting.org Subject: Re: [PATCH v2] udp6: Fix race condition in udp6_sendmsg & connect Hello: This patch was applied to netdev/net.git (main) by David S. Miller <davem@...emloft.net>: On Tue, 30 May 2023 14:39:41 +0300 you wrote: > Syzkaller got the following report: > BUG: KASAN: use-after-free in sk_setup_caps+0x621/0x690 net/core/sock.c:2018 > Read of size 8 at addr ffff888027f82780 by task syz-executor276/3255 > > The function sk_setup_caps (called by ip6_sk_dst_store_flow-> > ip6_dst_store) referenced already freed memory as this memory was > freed by parallel task in udpv6_sendmsg->ip6_sk_dst_lookup_flow-> > sk_dst_check. > > [...] Here is the summary with links: - [v2] udp6: Fix race condition in udp6_sendmsg & connect https://git.kernel.org/netdev/net/c/448a5ce1120c You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists