Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B84759D.2020406@kernel.sg>
Date: Wed, 24 Feb 2010 08:41:01 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: kernel: execution possible in non-executable mappings in recent 2.6
 kernels (SPARC only)

http://marc.info/?l=linux-sparc&m=126662196902830&w=2
http://marc.info/?l=linux-sparc&m=126662159602378&w=2

sparc64: Fix sun4u execute bit check in TSB I-TLB load.

TSB I-tlb load code tries to use andcc to check the _PAGE_EXEC_4U bit,
but that's bit 12 so it gets sign extended all the way up to bit 63
and the test nearly always passes as a result.

Use sethi to fix the bug.

I'm not requesting a CVE for this as this does not affect any of our 
kernels. But just a heads-up for those not aware of this.

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.