Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 10 Apr 2015 17:20:02 +0200
From: Pierre Schweitzer <pierre@...ctos.org>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: Kernel oops on 32 bits arch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Dear all,

This bug report has been brought to my attention [1] where under high
load a server can be oopsed, be it grsec or vanilla kernel.

Apparently, it's due to a partial fix that would have only be deployed
to 64 bits Linux [2].

Has anyone more info on this? Like why there was only a 64 bits fix?
Was a CVE assigned for this?

Cheers,

[1]: https://bugs.gentoo.org/show_bug.cgi?id=536040
[2]: https://lkml.org/lkml/2014/4/29/497
- -- 
Pierre Schweitzer <pierre@...ctos.org>
System & Network Administrator
Senior Kernel Developer
ReactOS Deutschland e.V.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=o4UY
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ