[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAeHK+zOdghTAu647iKBEU+0LqkYYOk0f7gPk_4T6BjNi=2sAQ@mail.gmail.com>
Date: Wed, 6 May 2020 13:50:52 +0200
From: Andrey Konovalov <andreyknvl@...gle.com>
To: Oliver Neukum <oneukum@...e.com>
Cc: syzbot <syzbot+7d42d68643a35f71ac8a@...kaller.appspotmail.com>,
devel@...verdev.osuosl.org,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
LKML <linux-kernel@...r.kernel.org>,
USB list <linux-usb@...r.kernel.org>, nishkadg.linux@...il.com,
syzkaller-bugs <syzkaller-bugs@...glegroups.com>
Subject: Re: KASAN: slab-out-of-bounds Read in hfa384x_usbin_callback
On Wed, May 6, 2020 at 10:54 AM Oliver Neukum <oneukum@...e.com> wrote:
>
> Am Freitag, den 20.03.2020, 12:28 -0700 schrieb syzbot:
> > Hello,
> >
> > syzbot found the following crash on:
> >
> > HEAD commit: e17994d1 usb: core: kcov: collect coverage from usb comple..
> > git tree: https://github.com/google/kasan.git usb-fuzzer
> > console output: https://syzkaller.appspot.com/x/log.txt?x=11d74573e00000
> > kernel config: https://syzkaller.appspot.com/x/.config?x=5d64370c438bc60
> > dashboard link: https://syzkaller.appspot.com/bug?extid=7d42d68643a35f71ac8a
> > compiler: gcc (GCC) 9.0.0 20181231 (experimental)
> > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15fa561de00000
> > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15d74573e00000
> >
> > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > Reported-by: syzbot+7d42d68643a35f71ac8a@...kaller.appspotmail.com
> >
>
> Hi,
>
> is this bug still active and can a test be run on it? I requested one
> yesterday. If my analysis is correct this bug has security
> implications, so it is kind of important.
I see your request in the queue and it's been registered and
completed, but for some reason syzbot didn't send an email with a
response.
Let me try this once again:
#syz test: https://github.com/google/kasan.git e17994d1
Download attachment "0001-hfa384x_usb-fix-buffer-overflow.patch" of type "application/octet-stream" (1613 bytes)
Powered by blists - more mailing lists