oss-sec mailing list archives
CVE request: kernel: MIPS: Fix potential DOS by untrusted user app
From: "Eugene Teo" <eugeneteo () kernel sg>
Date: Tue, 9 Dec 2008 10:44:54 +0800
Steve, can you please assign a CVE name. Thanks. --- commit e807f9574e37a3f202e677feaaad1b7c5d2c0db8 Author: Vlad Malov <Vlad.Malov () caviumnetworks com> Date: Tue Nov 18 15:05:46 2008 -0800 MIPS: Fix potential DOS by untrusted user app. On a 64 bit kernel if an o32 syscall was made with a syscall number less than 4000, we would read the function from outside of the bounds of the syscall table. This led to non-deterministic behavior including system crashes. While we were at it we reworked the 32 bit version as well to use fewer instructions. Both 32 and 64 bit versions are use the same code now. Signed-off-by: Vlad Malov <Vlad.Malov () caviumnetworks com> Signed-off-by: David Daney <ddaney () caviumnetworks com> Signed-off-by: Ralf Baechle <ralf () linux-mips org>
Current thread:
- CVE request: kernel: MIPS: Fix potential DOS by untrusted user app Eugene Teo (Dec 08)