Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 31 Dec 2013 14:33:57 +0800
From: Yongjian Xu <xuyongjiande@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE request - kernel: char: Int overflow in lp_do_ioctl()

Hi,

https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=1c2de820d66d704c7d6fffdd872b7670eb4e29bb

This is an integer overflow, and can be controlled via ioctl.

arg comes from user-space, so int overflow may occur in this:
LP_TIME(minor) = arg * HZ/100;

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.