Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 5 May 2010 10:58:05 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request [was Re: kernel:
 execution possible in non-executable mappings in recent 2.6 kernels (SPARC
 only)]

Please use CVE-2010-1451

Thanks.

-- 
    JB


----- "dann frazier" <dannf@...ian.org> wrote:

> On Wed, Feb 24, 2010 at 08:41:01AM +0800, Eugene Teo wrote:
> > http://marc.info/?l=linux-sparc&m=126662196902830&w=2
> > http://marc.info/?l=linux-sparc&m=126662159602378&w=2
> >
> > sparc64: Fix sun4u execute bit check in TSB I-TLB load.
> >
> > TSB I-tlb load code tries to use andcc to check the _PAGE_EXEC_4U
> bit,
> > but that's bit 12 so it gets sign extended all the way up to bit 63
> > and the test nearly always passes as a result.
> >
> > Use sethi to fix the bug.
> >
> > I'm not requesting a CVE for this as this does not affect any of our
>  
> > kernels. But just a heads-up for those not aware of this.
> 
> hey Steven,
>  Can we get a CVE allocated for this one?
> 
> -- 
> dann frazier

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.