[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] Lots of bugs in 32-bit x86 Linux entry code
From:       Simon McVittie <smcv () debian ! org>
Date:       2019-11-25 17:58:39
Message-ID: 20191125175839.GB197885 () espresso ! pseudorandom ! co ! uk
[Download RAW message or body]

On Mon, 25 Nov 2019 at 08:05:12 -0800, Andy Lutomirski wrote:
> It turns out that there are essentially no upstream development
> resources dedicated to x86_32 Linux. Perhaps unsurprisingly, it was
> badly broken.

To clarify, which of these do you mean?

A. IA-32 (uname -m: i?86) Linux kernels are buggy/vulnerable when running
   IA-32 (i?86-linux-*) user-space processes (which are the only user-space
   that these kernels support)

B. x86_64 (aka AMD64, uname -m: x86_64) Linux kernels are buggy/vulnerable
   when running IA-32 (i?86-linux-*) user-space processes, but not when
   running x86_64 (x86_64-linux-*) user-space processes

C. x86_64 (AMD64) Linux kernels are buggy/vulnerable when running x32
   (x86_64-linux-gnux32) processes

D. something else?

If I'm understanding correctly, you are reporting A, and only A?

Thanks,
    smcv
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic