lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <169468202703.21796.14136496528263954193.git-patchwork-notify@kernel.org> Date: Thu, 14 Sep 2023 09:00:27 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Kuniyuki Iwashima <kuniyu@...zon.com> Cc: davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, syoshida@...hat.com, tom@...bertland.com, kuni1840@...il.com, netdev@...r.kernel.org Subject: Re: [PATCH v1 net] kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg(). Hello: This patch was applied to netdev/net.git (main) by Paolo Abeni <pabeni@...hat.com>: On Mon, 11 Sep 2023 19:27:53 -0700 you wrote: > syzkaller found a memory leak in kcm_sendmsg(), and commit c821a88bd720 > ("kcm: Fix memory leak in error path of kcm_sendmsg()") suppressed it by > updating kcm_tx_msg(head)->last_skb if partial data is copied so that the > following sendmsg() will resume from the skb. > > However, we cannot know how many bytes were copied when we get the error. > Thus, we could mess up the MSG_MORE queue. > > [...] Here is the summary with links: - [v1,net] kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg(). https://git.kernel.org/netdev/net/c/a22730b1b4bf You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists