Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.8. Attached to the
email were a PoC file of the issue.
Stack dump:
[ cut here ]
unexpected event refcount: 2; ptr
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.8. Attached to the
email were a PoC file of the issue.
Stack dump:
BUG: TASK stack guard page was hit at c90001b27f88 (stack is
c90001b28000
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
loop3: detected capacity change from 0 to 8
MTD: Attempt to mount non-MTD device
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
bcachefs (loop0): error validating btree node on loop0 at btree extents level
0/0
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
[ cut here ]
WARNING: CPU: 0 PID: 10070 at fs/crypto/fname.c
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
WARNING: inconsistent lock state
6.7.0 #2 Not tainted
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
BUG: unable to handle page fault for address: ed110c2fd97f
#PF: supervisor read
> Hello,
> Thanks for the report. Could you please provide a reproducer?
> Regards,
> Mickaël
Hi.
The Poc file has seed to you as attachment.
> On Sun, Apr 28, 2024 at 10:47:02AM +0800, Ubisectech Sirius wrote:
>> Hello.
>> We are Ubisectech Sirius Team, the
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
loop3: detected capacity change from 0 to 1024
[ cut here
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.8. Attached to the
email were a PoC file of the issue.
Stack dump:
loop0: detected capacity change from 0 to 64
hfs: unable to locate alternate MDB
hfs
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.8. Attached to the
email were a PoC file of the issue.
Stack dump:
[ cut here ]
UBSAN: array-index-out-of-bounds in fs/squashfs
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
general protection fault, probably for non-canonical address
0xff1f1b1f1f1f1f24:
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
general protection fault, probably for non-canonical address
0xdc001cc6:
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7. Attached to the
email were a PoC file of the issue.
Stack dump:
general protection fault, probably for non-canonical address
0xff1f1b1f1f1f1f24:
r than wake
> it and have it error.
Hi.
The issue does not appear again when I apply the patch to the Linux kernel.
On 3/17/24 6:59 PM, Ubisectech Sirius wrote:
> Hello.
> We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
> Recently, our team has discovered
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.8.0-ge5e038b7ae9d.
Attached to the email were a POC file of the issue.
Stack dump:
==
BUG
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel
6.8.0-rc1-gecb1b8288dc7. Attached to the email were a POC file of the issue.
Stack dump:
rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 1
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel
6.8.0-rc2-g6764c317b6bb. Attached to the email were a POC file of the issue.
Stack dump:
rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel
6.8.0-rc1-gecb1b8288dc7. Attached to the email were a POC file of the issue.
Stack dump:
[ 246.195553][ T4096] [ cut here
>Great, thank you for testing! I'll send a proper patch. How would you
>like to be credited with reporting? Just as 'Ubisectech Sirius
>' ?
Hello.
Please use 'Ubisectech Sirius' to credit the
report. Thanks.
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7.0-g9d1694dc91ce.
Attached to the email were a POC file of the issue.
Stack dump:
general protection fault, probably for non-canonical address
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7.0-g052d534373b7.
Attached to the email were a POC file of the issue.
Stack dump:
[ 154.711833][ T8003] [ cut here ]
[ 154.711851
Hello.
We are Ubisectech Sirius Team, the vulnerability lab of China ValiantSec.
Recently, our team has discovered a issue in Linux kernel 6.7.0-g052d534373b7.
Attached to the email were a POC file of the issue.
Stack dump:
[ 185.664167][ T8332] BUG: unable to handle page fault for address
23 matches
Mail list logo