general protection fault in ath9k_wmi_event_tasklet

2024-01-22 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7.0-g9d1694dc91ce. Attached to the email were a POC file of the issue. Stack dump: general protection fault, probably for non-canonical address

BUG: unable to handle kernel paging request in __skb_flow_dissect

2024-01-16 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7.0-g052d534373b7. Attached to the email were a POC file of the issue. Stack dump: [ 185.664167][ T8332] BUG: unable to handle page fault for address

回复:回复:general protection fault in ath9k_wmi_event_tasklet

2024-01-25 Thread Ubisectech Sirius
>Great, thank you for testing! I'll send a proper patch. How would you >like to be credited with reporting? Just as 'Ubisectech Sirius >' ? Hello. Please use 'Ubisectech Sirius' to credit the report. Thanks.

WARNING in shmem_release_dquot

2024-01-29 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.8.0-rc1-gecb1b8288dc7. Attached to the email were a POC file of the issue. Stack dump: [ 246.195553][ T4096] [ cut here

WARNING in depot_fetch_stack

2024-01-21 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7.0-g052d534373b7. Attached to the email were a POC file of the issue. Stack dump: [ 154.711833][ T8003] [ cut here ] [ 154.711851

INFO: rcu detected stall in nsim_fib_event_work

2024-02-02 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.8.0-rc2-g6764c317b6bb. Attached to the email were a POC file of the issue. Stack dump: rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks

INFO: rcu detected stall in idle_cull_fn

2024-02-02 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.8.0-rc1-gecb1b8288dc7. Attached to the email were a POC file of the issue. Stack dump: rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 1

general protection fault in integrity_inode_get

2024-04-14 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.8. Attached to the email were a PoC file of the issue. Stack dump: loop0: detected capacity change from 0 to 64 hfs: unable to locate alternate MDB hfs

WARNING in current_check_refer_path

2024-04-27 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: loop3: detected capacity change from 0 to 1024 [ cut here

BUG: unable to handle kernel paging request in do_split

2024-04-29 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: BUG: unable to handle page fault for address: ed110c2fd97f #PF: supervisor read

回复:WARNING in current_check_refer_path

2024-04-29 Thread Ubisectech Sirius
> Hello, > Thanks for the report. Could you please provide a reproducer? > Regards, > Mickaël Hi. The Poc file has seed to you as attachment. > On Sun, Apr 28, 2024 at 10:47:02AM +0800, Ubisectech Sirius wrote: >> Hello. >> We are Ubisectech Sirius Team, the

WARNING in fscrypt_fname_siphash

2024-05-09 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: [ cut here ] WARNING: CPU: 0 PID: 10070 at fs/crypto/fname.c

general protection fault in crypto_skcipher_encrypt

2024-05-09 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: bcachefs (loop0): error validating btree node on loop0 at btree extents level 0/0

inconsistent lock state in __mmap_lock_do_trace_released

2024-05-08 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: WARNING: inconsistent lock state 6.7.0 #2 Not tainted

WARNING: kmalloc bug in bpf_uprobe_multi_link_attach

2024-05-14 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: loop3: detected capacity change from 0 to 8 MTD: Attempt to mount non-MTD device

回复:KASAN: null-ptr-deref Write in tctx_task_work_run

2024-03-18 Thread Ubisectech Sirius
ather than wake > it and have it error. Hi. The issue does not appear again when I apply the patch to the Linux kernel. On 3/17/24 6:59 PM, Ubisectech Sirius wrote: > Hello. > We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. > Recently, our team has discovered a iss

KASAN: null-ptr-deref Write in tctx_task_work_run

2024-03-17 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.8.0-ge5e038b7ae9d. Attached to the email were a POC file of the issue. Stack dump: == BUG

general protection fault in __fib6_update_sernum_upto_root

2024-04-01 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: general protection fault, probably for non-canonical address 0xff1f1b1f1f1f1f24:

UBSAN array-index-out-of-bounds in read_blocklist

2024-04-07 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.8. Attached to the email were a PoC file of the issue. Stack dump: [ cut here ] UBSAN: array-index-out-of-bounds in fs/squashfs

general protection fault in __fib6_update_sernum_upto_root

2024-04-01 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: general protection fault, probably for non-canonical address 0xff1f1b1f1f1f1f24:

general protection fault in refill_obj_stock

2024-04-01 Thread Ubisectech Sirius
Hello. We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec. Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the email were a PoC file of the issue. Stack dump: general protection fault, probably for non-canonical address 0xdc001cc6: