Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 10 Apr 2015 17:20:02 +0200
From: Pierre Schweitzer <pierre@...ctos.org>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: Kernel oops on 32 bits arch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Dear all,

This bug report has been brought to my attention [1] where under high
load a server can be oopsed, be it grsec or vanilla kernel.

Apparently, it's due to a partial fix that would have only be deployed
to 64 bits Linux [2].

Has anyone more info on this? Like why there was only a 64 bits fix?
Was a CVE assigned for this?

Cheers,

[1]: https://bugs.gentoo.org/show_bug.cgi?id=536040
[2]: https://lkml.org/lkml/2014/4/29/497
- -- 
Pierre Schweitzer <pierre@...ctos.org>
System & Network Administrator
Senior Kernel Developer
ReactOS Deutschland e.V.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJVJ+ohAAoJEHVFVWw9WFsLHKEP/jj9wEyuRJB0eqbkoJOZXmdI
F1N0T+Yhg4oRPt6O+w7Ari+f2+uTVtvaLnikWqWjGyrRhWRwETTjg/hSZjS0OcFA
4CKomPpka/iP1IASzjVO6L4eGJ22qNoEiq8XjrN30iHJD3c5nAC+DB2y7qwn+rPY
SFJbdOjv5SxVmUjBWZrr8IQ9FOtwKUGcbPY1kqlnMnL7rArERc7UA5u7WLzBhUNm
Uaoutr66sCjGO/py+GPDd1HQsvr1Grpx9qYMAOgz3hlHCuZJ86A5Z9auvyWwuRTB
ixajID2lFMHtJhDHCfVIqRv4fnUA7rLzEhtfbRLPXfmcYSdS8i+t9I5kre6Fy2in
c4s4QtVcdQJnh1vVgAk3rrPUf51TNBoRt5Fk+4RqLglDELworuHoXwC4GV6c6vZZ
RJ8vnhCO1ThY8HDKW/wH7fZ8fgbKBuXzvrfbCnAVuvkuYYU/EiTSULMcX6d7hq9D
MBKFakMr+xWIXlKmv6Y31g2OK2kOpw9Wu0f/lDHgkCw4rKuZuIBG12yYe+m0Xn/a
dMVl1jau3Crs8KbeXCnDtuXnO3GPJ6+cxcuvUcuxJUHaSbKd00OOHO9KToCz4ZDL
Sy2E6KtgKOtqAwHkkDwT0i1FwVDbK3kKw0xMwiVwsMPdf+lyqe20s0fixZgF2eeS
xyX5ok91ot1BVIGXwkeY
=o4UY
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.