> From: Jesse Hertz <[email protected]>
> Date: Mon, 1 Aug 2016 14:38:19 -0400
> 
> Hi All,
> 
> Is a fix for this in the works? We'd like to be able to point to a
> fix before posting to oss-sec :)

Hi Jesse,

The fix suggested in the analysis has been committed, and we have
committed two other fixes to prevent against overflows/underflows in
related uvm code.  Not sure if somebody is doing an errata for -stable
for this.

CVSROOT:        /cvs
Module name:    src
Changes by:     [email protected]    2016/07/29 14:44:40

Modified files:
        sys/uvm        : uvm_map.c 

Log message:
add a check that the arguments to isavail don't overflow.
callers should probably check too, but checking here won't hurt.
possible panic reported by tim newsham.
ok kettenis


CVSROOT:        /cvs
Module name:    src
Changes by:     [email protected]        2016/07/30 10:37:55

Modified files:
        sys/uvm        : uvm_addr.c 

Log message:
Add a few checks for potential integer overflow and underflow related to the
size of an address range.

ok deraadt@, tedu@


CVSROOT:        /cvs
Module name:    src
Changes by:     [email protected]        2016/07/30 10:43:44

Modified files:
        sys/uvm        : uvm_map.c 

Log message:
Check for wraparound before the "commit" phase of uvm_map() and uvm_mapanon(),
to prevent hitting assertions and/or corrupting data structures during that
phase.

ok deraadt@, tedu@



Reply via email to