[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] Lots of bugs in 32-bit x86 Linux entry code
From: Simon McVittie <smcv () debian ! org>
Date: 2019-11-25 17:58:39
Message-ID: 20191125175839.GB197885 () espresso ! pseudorandom ! co ! uk
[Download RAW message or body]
On Mon, 25 Nov 2019 at 08:05:12 -0800, Andy Lutomirski wrote:
> It turns out that there are essentially no upstream development
> resources dedicated to x86_32 Linux. Perhaps unsurprisingly, it was
> badly broken.
To clarify, which of these do you mean?
A. IA-32 (uname -m: i?86) Linux kernels are buggy/vulnerable when running
IA-32 (i?86-linux-*) user-space processes (which are the only user-space
that these kernels support)
B. x86_64 (aka AMD64, uname -m: x86_64) Linux kernels are buggy/vulnerable
when running IA-32 (i?86-linux-*) user-space processes, but not when
running x86_64 (x86_64-linux-*) user-space processes
C. x86_64 (AMD64) Linux kernels are buggy/vulnerable when running x32
(x86_64-linux-gnux32) processes
D. something else?
If I'm understanding correctly, you are reporting A, and only A?
Thanks,
smcv
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic