|
Message-ID: <4BDA2807.3000703@redhat.com> Date: Fri, 30 Apr 2010 08:44:55 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: Hui Zhu <hui.zhu@...driver.com>, Paul Gortmaker <paul.gortmaker@...driver.com>, +security-linux <security-linux@...driver.com>, "Wessel, Jason" <jason.wessel@...driver.com>, Wu Fei <fei.wu@...driver.com> Subject: Re: CVE request - Linux Kernel KGDB/ppc issue On 04/29/2010 10:13 AM, Hui Zhu wrote: > Hi All, > > The problem is that if KGDB is enabled on a powerpc board, a > test that checks if a page is user or kernel is bypassed. > This means that a user can write to arbitrary kernel address space. > > Upon further investigation, we found that kernels older than > the v2.6.30-rc1 release have the same problem for non-booke > ppc chips (74xx, 8641D), so we need two patches for kernels > up to that date, and then one patch for ones after that date. http://www.mail-archive.com/linuxppc-dev@lists.ozlabs.org/msg30044.html Sun, 01 Mar 2009 22:25:03 -0800 "Note: While at it, I removed a non-sensical statement related to CONFIG_KGDB in ppc_mmu_32.c which could cause kernel mappings to be user accessible when that option is enabled. Probably something that bitrot." Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.