Re: 回复:WARNING in current_check_refer_path

2024-04-29 Thread Mickaël Salaün
On Mon, Apr 29, 2024 at 05:16:57PM +0800, Ubisectech Sirius wrote: > > Hello, > > > Thanks for the report. Could you please provide a reproducer? > > > Regards, > > Mickaël > > Hi. > The Poc file has seed to you as attachment. Indeed, but could you please trim down the file. There are 650

回复:WARNING in current_check_refer_path

2024-04-29 Thread Ubisectech Sirius
> Hello, > Thanks for the report. Could you please provide a reproducer? > Regards, > Mickaël Hi. The Poc file has seed to you as attachment. > On Sun, Apr 28, 2024 at 10:47:02AM +0800, Ubisectech Sirius wrote: >> Hello. >> We are Ubisectech Sirius Team, the vulnerability lab of China

Re: WARNING in current_check_refer_path

2024-04-29 Thread Mickaël Salaün
Hello, Thanks for the report. Could you please provide a reproducer? Regards, Mickaël On Sun, Apr 28, 2024 at 10:47:02AM +0800, Ubisectech Sirius wrote: > Hello. > We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. > Recently, our team has discovered a issue in Linux

WARNING in current_check_refer_path

2024-04-27 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: loop3: detected capacity change from 0 to 1024 [ cut here ]