Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 8 Dec 2017 10:48:54 +0100
From: Greg KH <greg@...ah.com>
To: Dan Carpenter <dan.carpenter@...cle.com>
Cc: at zhou <zhouat2017@...il.com>, security@...nel.org,
	secalert@...hat.com, security@...e.com, tglx@...utronix.de,
	oss-security@...ts.openwall.com, linux-distros@...openwall.org
Subject: Re: signed integer overflow in common_timer_get on linux 4.15.0-rc1

On Fri, Dec 08, 2017 at 12:09:50PM +0300, Dan Carpenter wrote:
> On Thu, Dec 07, 2017 at 12:17:18PM +0100, Greg KH wrote:
> > On Thu, Dec 07, 2017 at 06:01:43PM +0800, at zhou wrote:
> > > Hi all,
> > > 
> > > credit   to   L5@...vulcan team
> > > 
> > > I fuzzed the linux kernel and find signed integer overflow on linux
> > > 4.15.0-rc1+.
> > > the crash log can see below, the .config and the poc file ,please see the
> > > attachments.
> > 
> > Odd, doesn't seem to affect a 4.9 or 4.15-rc2 kernel here on my
> > machines, is there something specific in the .config that might be
> > triggering this?
> > 
> 
> Greg, you're running with UBSAN?

Ah, missed that one.  No, I'm not crazy :)

Makes a bit more sense.

at zhou, care to make up a patch for this as it seems you can test it
easily?

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.