|
Message-ID: <20191125175839.GB197885@espresso.pseudorandom.co.uk> Date: Mon, 25 Nov 2019 17:58:39 +0000 From: Simon McVittie <smcv@...ian.org> To: oss-security@...ts.openwall.com Subject: Re: Lots of bugs in 32-bit x86 Linux entry code On Mon, 25 Nov 2019 at 08:05:12 -0800, Andy Lutomirski wrote: > It turns out that there are essentially no upstream development > resources dedicated to x86_32 Linux. Perhaps unsurprisingly, it was > badly broken. To clarify, which of these do you mean? A. IA-32 (uname -m: i?86) Linux kernels are buggy/vulnerable when running IA-32 (i?86-linux-*) user-space processes (which are the only user-space that these kernels support) B. x86_64 (aka AMD64, uname -m: x86_64) Linux kernels are buggy/vulnerable when running IA-32 (i?86-linux-*) user-space processes, but not when running x86_64 (x86_64-linux-*) user-space processes C. x86_64 (AMD64) Linux kernels are buggy/vulnerable when running x32 (x86_64-linux-gnux32) processes D. something else? If I'm understanding correctly, you are reporting A, and only A? Thanks, smcv
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.