[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <7E55CE8C-959B-42B7-B991-4E385D1D6E38@earthlink.net>
Date: Wed, 20 Oct 2010 22:40:08 -0700
From: Mitchell Erblich <erblichs@...thlink.net>
To: linux-kernel@...r.kernel.org
Subject: Verification of SYScall changes because of CVE-2009-0029
he ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.
Has anyone been able to verify (a program that exploits this issue) ?
Thanks,
Please copy me if you respond.
Mitchell Erblich--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists