oss-sec mailing list archives

Re: Lots of bugs in 32-bit x86 Linux entry code


From: Simon McVittie <smcv () debian org>
Date: Mon, 25 Nov 2019 17:58:39 +0000

On Mon, 25 Nov 2019 at 08:05:12 -0800, Andy Lutomirski wrote:
It turns out that there are essentially no upstream development
resources dedicated to x86_32 Linux. Perhaps unsurprisingly, it was
badly broken.

To clarify, which of these do you mean?

A. IA-32 (uname -m: i?86) Linux kernels are buggy/vulnerable when running
   IA-32 (i?86-linux-*) user-space processes (which are the only user-space
   that these kernels support)

B. x86_64 (aka AMD64, uname -m: x86_64) Linux kernels are buggy/vulnerable
   when running IA-32 (i?86-linux-*) user-space processes, but not when
   running x86_64 (x86_64-linux-*) user-space processes

C. x86_64 (AMD64) Linux kernels are buggy/vulnerable when running x32
   (x86_64-linux-gnux32) processes

D. something else?

If I'm understanding correctly, you are reporting A, and only A?

Thanks,
    smcv


Current thread: