|
Message-ID: <5527EA22.2000702@reactos.org> Date: Fri, 10 Apr 2015 17:20:02 +0200 From: Pierre Schweitzer <pierre@...ctos.org> To: OSS Security List <oss-security@...ts.openwall.com> Subject: Kernel oops on 32 bits arch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Dear all, This bug report has been brought to my attention [1] where under high load a server can be oopsed, be it grsec or vanilla kernel. Apparently, it's due to a partial fix that would have only be deployed to 64 bits Linux [2]. Has anyone more info on this? Like why there was only a 64 bits fix? Was a CVE assigned for this? Cheers, [1]: https://bugs.gentoo.org/show_bug.cgi?id=536040 [2]: https://lkml.org/lkml/2014/4/29/497 - -- Pierre Schweitzer <pierre@...ctos.org> System & Network Administrator Senior Kernel Developer ReactOS Deutschland e.V. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVJ+ohAAoJEHVFVWw9WFsLHKEP/jj9wEyuRJB0eqbkoJOZXmdI F1N0T+Yhg4oRPt6O+w7Ari+f2+uTVtvaLnikWqWjGyrRhWRwETTjg/hSZjS0OcFA 4CKomPpka/iP1IASzjVO6L4eGJ22qNoEiq8XjrN30iHJD3c5nAC+DB2y7qwn+rPY SFJbdOjv5SxVmUjBWZrr8IQ9FOtwKUGcbPY1kqlnMnL7rArERc7UA5u7WLzBhUNm Uaoutr66sCjGO/py+GPDd1HQsvr1Grpx9qYMAOgz3hlHCuZJ86A5Z9auvyWwuRTB ixajID2lFMHtJhDHCfVIqRv4fnUA7rLzEhtfbRLPXfmcYSdS8i+t9I5kre6Fy2in c4s4QtVcdQJnh1vVgAk3rrPUf51TNBoRt5Fk+4RqLglDELworuHoXwC4GV6c6vZZ RJ8vnhCO1ThY8HDKW/wH7fZ8fgbKBuXzvrfbCnAVuvkuYYU/EiTSULMcX6d7hq9D MBKFakMr+xWIXlKmv6Y31g2OK2kOpw9Wu0f/lDHgkCw4rKuZuIBG12yYe+m0Xn/a dMVl1jau3Crs8KbeXCnDtuXnO3GPJ6+cxcuvUcuxJUHaSbKd00OOHO9KToCz4ZDL Sy2E6KtgKOtqAwHkkDwT0i1FwVDbK3kKw0xMwiVwsMPdf+lyqe20s0fixZgF2eeS xyX5ok91ot1BVIGXwkeY =o4UY -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.