Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 2 Jul 2020 17:21:42 +0200
From: Adam Zabrocki <>
Subject: Re: use miss check, lead to null pointer crash


We do not support kernels compiled with CLANG. Our stack walk algorithm is 
designed for default GCC case.
If you verify pointer against NULL, you just mask the problem (and most likely 
generate False Possitives). CLANG stack-walk would need to be rewritten. 
However, as I mentioned we do not support such case.

For now you can completely disable pCFI.


On Thu, Jul 02, 2020 at 05:36:24PM +0800, youyan wrote:
> Hi lkrg team:
>      In function p_ed_enforce_pcfi(),fellow code  miss check before use :
>       p_frame.fp = *(unsigned long *)(p_fp - 12);
>       p_frame.sp = *(unsigned long *)(p_fp - 8);
>       p_frame.pc = *(unsigned long *)(p_fp - 4);
>     above code will lead to null pointer crash.  This null pointer situation  exist LKRG complie by clang 8.0.

pi3 (pi3ki31ny) - pi3 (at) itsec pl

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.