public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Verification of SYScall changes because of CVE-2009-0029
@ 2010-10-21  5:40 Mitchell Erblich
  2010-10-21 21:46 ` Christian Borntraeger
  0 siblings, 1 reply; 2+ messages in thread
From: Mitchell Erblich @ 2010-10-21  5:40 UTC (permalink / raw)
  To: linux-kernel

he ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.

Has anyone been able to verify  (a program that exploits this issue) ?

Thanks,
		Please copy me if you respond.		
		Mitchell Erblich

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: Verification of SYScall changes because of CVE-2009-0029
  2010-10-21  5:40 Verification of SYScall changes because of CVE-2009-0029 Mitchell Erblich
@ 2010-10-21 21:46 ` Christian Borntraeger
  0 siblings, 0 replies; 2+ messages in thread
From: Christian Borntraeger @ 2010-10-21 21:46 UTC (permalink / raw)
  To: Mitchell Erblich; +Cc: linux-kernel

Am 21.10.2010 07:40, schrieb Mitchell Erblich:
> he ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips
> 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly
> sign extended when sent from a user-mode application, but cannot verify this, which
> allows local users to cause a denial of service (crash) or possibly gain privileges 
> via a crafted system call.
> 
> Has anyone been able to verify  (a program that exploits this issue) ?

I found the problem with crashme and I was able to reduce the test to a
5 line C program - so yes, the problem can happen for real. The thing is
that this was no generic exploit, the problem from the testcase existed 
only with specific gcc, kernel, syscall and architecture but there might
be others - we dont know. So sorry, there is no generic test case that 
checks if the problem is fixed.

Christian



^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2010-10-21 21:46 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-10-21  5:40 Verification of SYScall changes because of CVE-2009-0029 Mitchell Erblich
2010-10-21 21:46 ` Christian Borntraeger

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox