Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 9 Dec 2008 10:44:54 +0800
From: "Eugene Teo" <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: MIPS: Fix potential DOS by untrusted user app

Steve, can you please assign a CVE name. Thanks.

---
commit e807f9574e37a3f202e677feaaad1b7c5d2c0db8
Author: Vlad Malov <Vlad.Malov@...iumnetworks.com>
Date:   Tue Nov 18 15:05:46 2008 -0800

    MIPS: Fix potential DOS by untrusted user app.

    On a 64 bit kernel if an o32 syscall was made with a syscall number less
    than 4000, we would read the function from outside of the bounds of the
    syscall table.  This led to non-deterministic behavior including system
    crashes.

    While we were at it we reworked the 32 bit version as well to use fewer
    instructions.  Both 32 and 64 bit versions are use the same code now.

    Signed-off-by: Vlad Malov <Vlad.Malov@...iumnetworks.com>
    Signed-off-by: David Daney <ddaney@...iumnetworks.com>
    Signed-off-by: Ralf Baechle <ralf@...ux-mips.org>

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.