Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 16 Sep 2010 13:33:13 +0800
From: Eugene Teo <>
CC: "Steven M. Christey" <>
Subject: CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow

Reported by Ben Hawkes. "A vulnerability in the 32-bit compatibility 
layer for 64-bit systems was reported. It is caused by insecure 
allocation of user space memory when translating system call inputs to 
64-bit. A stack pointer underflow can occur when using the 
"compat_alloc_user_space" method with an arbitrary length input."


Upstream commit:

Thanks, Eugene
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.