[Lucid][CVE-2014-4608]PATCH 0/3] lzo: properly check for overruns
Luis Henriques
luis.henriques at canonical.com
Mon Jun 30 14:04:58 UTC 2014
Luis Henriques <luis.henriques at canonical.com> writes:
>> On a quick inspection it is hard to tell what it is consumed by sadly.
>> But worth spending half an hour checking.
>>
>> -apw
>
> A quick 'git grep' shows that there are two consumers of functions
> lzo1x_1_compress() and lzo1x_decompress_safe(): fs/jffs2 and
> ubuntu/compcache.
>
> Looks like this last module (ramzswap) allows to run a quick test
> verify LZO isn't broken. I'll do the following:
>
> 1. Run a Lucid system and enable a /dev/ramzswap0 device as the only
> swap device for the system (disabling any other swap device set by
> default on boot)
>
> 2. Load the system so that swap is used
>
> 3. Reduce the load so that swap space is back to 0
>
> 4. Do 2 and 3 for a while
>
> I'll report back later after running this test for a while.
>
> Cheers,
> --
> Luís
Ok, I've built a Lucid test kernel containing these 3 patches and
executed the test case described above. I was able fill 100% of the
ramzswap device several times without any error/warning in the
kernel.
If this doesn't proof I'm not breaking LZO, at least it increases my
confidence on the patches :-)
Cheers,
--
Luís
More information about the kernel-team
mailing list