| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <7bea2244-dc28-4c67-b515-739b8b7d7901@redhat.com> Date: Thu, 4 Dec 2025 11:04:18 +0100 From: Paolo Abeni <pabeni@...hat.com> To: Wang Liang <wangliang74@...wei.com>, Deepanshu Kartikey <kartikey406@...il.com>, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, horms@...nel.org Cc: linux-hams@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, syzbot+d7abc36bbbb6d7d40b58@...kaller.appspotmail.com Subject: Re: [PATCH] net: netrom: fix memory leak in nr_output() On 11/29/25 5:01 AM, Wang Liang wrote: > 在 2025/11/29 11:42, Deepanshu Kartikey 写道: >> When nr_output() fragments a large packet, it calls sock_alloc_send_skb() > > Hi! > > Coincidentally, we both are working on this issue simultaneously. > > From the syz test requests: > https://syzkaller.appspot.com/bug?extid=d7abc36bbbb6d7d40b58 > > I sended the test patch earlier, only a dozen seconds... FTR and future similar cases, we don't have the send time information handy. Instead we use the timestamp as available on patchwork. In this specific case Deepanshu's patch landed first, but does not apply cleanly, so I'll apply Wang's one. Cheers, Paolo
Powered by blists - more mailing lists