Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Ernest_at_the_Beach
Eugene Teo (Security Response) 2010-09-16 01:23:13 EDT
Description of problem:
A vulnerability in the 32-bit compatibility layer for 64-bit systems was
reported. It is caused by insecure allocation of user space memory when
translating system call inputs to 64-bit. A stack pointer underflow can occur
when using the "compat_alloc_user_space" method with an arbitrary length input.

Reference:
http://sota.gen.nz/compat1/

Upstream commit:
http://git.kernel.org/linus/c41d68a513c71e35a14f66d71782d27a79a81ea6

Acknowledgements:

Red Hat would like to thank Ben Hawkes for reporting this issue.

5 posted on 09/21/2010 9:26:53 AM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 4 | View Replies ]


To: Ernest_at_the_Beach
Eugene Teo (Security Response) 2010-09-16 03:17:41 EDT
Exploit: http://seclists.org/fulldisclosure/2010/Sep/268

6 posted on 09/21/2010 9:27:41 AM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 5 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson