|
Message-ID: <CABVvea15aMSR5ZB9e-BppnSzGanbCeCgBq2JRx3Mj=K+jtLgUw@mail.gmail.com> Date: Tue, 31 Dec 2013 14:33:57 +0800 From: Yongjian Xu <xuyongjiande@...il.com> To: oss-security@...ts.openwall.com Subject: CVE request - kernel: char: Int overflow in lp_do_ioctl() Hi, https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=1c2de820d66d704c7d6fffdd872b7670eb4e29bb This is an integer overflow, and can be controlled via ioctl. arg comes from user-space, so int overflow may occur in this: LP_TIME(minor) = arg * HZ/100;
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.