oss-sec mailing list archives
Re: Lots of bugs in 32-bit x86 Linux entry code
From: Simon McVittie <smcv () debian org>
Date: Mon, 25 Nov 2019 17:58:39 +0000
On Mon, 25 Nov 2019 at 08:05:12 -0800, Andy Lutomirski wrote:
It turns out that there are essentially no upstream development resources dedicated to x86_32 Linux. Perhaps unsurprisingly, it was badly broken.
To clarify, which of these do you mean? A. IA-32 (uname -m: i?86) Linux kernels are buggy/vulnerable when running IA-32 (i?86-linux-*) user-space processes (which are the only user-space that these kernels support) B. x86_64 (aka AMD64, uname -m: x86_64) Linux kernels are buggy/vulnerable when running IA-32 (i?86-linux-*) user-space processes, but not when running x86_64 (x86_64-linux-*) user-space processes C. x86_64 (AMD64) Linux kernels are buggy/vulnerable when running x32 (x86_64-linux-gnux32) processes D. something else? If I'm understanding correctly, you are reporting A, and only A? Thanks, smcv
Current thread:
- Lots of bugs in 32-bit x86 Linux entry code Andy Lutomirski (Nov 25)
- Re: Lots of bugs in 32-bit x86 Linux entry code Stuart D. Gathman (Nov 25)
- Re: Lots of bugs in 32-bit x86 Linux entry code Simon McVittie (Nov 25)