|
Message-ID: <20131231070501.GA5874@kroah.com> Date: Mon, 30 Dec 2013 23:05:01 -0800 From: Greg KH <greg@...ah.com> To: oss-security@...ts.openwall.com Subject: Re: CVE request - kernel: char: Int overflow in lp_do_ioctl() On Tue, Dec 31, 2013 at 02:33:57PM +0800, Yongjian Xu wrote: > Hi, > > https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=1c2de820d66d704c7d6fffdd872b7670eb4e29bb > > This is an integer overflow, and can be controlled via ioctl. > > arg comes from user-space, so int overflow may occur in this: > LP_TIME(minor) = arg * HZ/100; What exactly can happen if you set that value to a really high number? (hint, I really don't think anything happens at all, no matter what you set that value to...) How does this warrent a CVE? thanks, greg k-h
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.