* Borislav Petkov wrote:
> On Wed, Feb 18, 2015 at 09:19:01PM +0100, Ingo Molnar wrote:
> > Absolutely, this is x86/urgent material, so no need to wait for -rc1
> > with it.
>
> Right, so I can start shuffling stuff to you tomorrow,
> this patch is in one of the pull requests. I can drop it
>
On Wed, Feb 18, 2015 at 09:19:01PM +0100, Ingo Molnar wrote:
> Absolutely, this is x86/urgent material, so no need to wait for -rc1
> with it.
Right, so I can start shuffling stuff to you tomorrow, this patch is in
one of the pull requests. I can drop it too if preferred. I'll let you
guys decide.
* Andrew Morton wrote:
> On Wed, 18 Feb 2015 10:15:43 +0100 Borislav Petkov wrote:
> > > CVE-2015-1593
> > >
> > > Signed-off-by: Hector Marco-Gisbert
> > > Signed-off-by: Ismael Ripoll
> > > [kees: rebase, fix 80 char, clean up commit message, add test example,
> > > cve]
> > > Signed-off-
On Wed, 18 Feb 2015 10:15:43 +0100 Borislav Petkov wrote:
> > CVE-2015-1593
> >
> > Signed-off-by: Hector Marco-Gisbert
> > Signed-off-by: Ismael Ripoll
> > [kees: rebase, fix 80 char, clean up commit message, add test example, cve]
> > Signed-off-by: Kees Cook
> > Cc: sta...@vger.kernel.org
>
On Sat, Feb 14, 2015 at 09:33:50AM -0800, Kees Cook wrote:
> From: Hector Marco-Gisbert
>
> The issue is that the stack for processes is not properly randomized on 64 bit
> architectures due to an integer overflow.
>
> The affected function is randomize_stack_top() in file "fs/binfmt_elf.c":
>
On Mon, Feb 16, 2015 at 12:49 PM, Andy Lutomirski wrote:
> On 02/14/2015 09:33 AM, Kees Cook wrote:
>>
>> From: Hector Marco-Gisbert
>>
>> The issue is that the stack for processes is not properly randomized on 64
>> bit
>> architectures due to an integer overflow.
>>
>> The affected function is
On 02/14/2015 09:33 AM, Kees Cook wrote:
From: Hector Marco-Gisbert
The issue is that the stack for processes is not properly randomized on 64 bit
architectures due to an integer overflow.
The affected function is randomize_stack_top() in file "fs/binfmt_elf.c":
static unsigned long randomize
From: Hector Marco-Gisbert
The issue is that the stack for processes is not properly randomized on 64 bit
architectures due to an integer overflow.
The affected function is randomize_stack_top() in file "fs/binfmt_elf.c":
static unsigned long randomize_stack_top(unsigned long stack_top)
{
8 matches
Mail list logo