Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 142616 - Kernel: s390: fix in-user atomic futex operation (CVE-2006-3634)
Summary: Kernel: s390: fix in-user atomic futex operation (CVE-2006-3634)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.kernel.org/git/?p=linux/ke...
Whiteboard: [linux <2.6.17]
Keywords:
Depends on:
Blocks:
 
Reported: 2006-08-03 00:49 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2009-07-21 17:36 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-08-03 00:49:11 UTC
From: Martin Schwidefsky <schwidefsky@de.ibm.com>
 
 __futex_atomic_op needs to do an atomic operation in the user address space,
 not the kernel address space.  Add the missing sacf 256/sacf 0 to switch to
 the secondary mode before doing the compare-and-swap.  In addition add
 another fixup for catch specification exceptions if the compare-and-swap
 address is not aligned.
 
 Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
 Signed-off-by: Andrew Morton <akpm@osdl.org>
 Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Comment 1 Tim Yamin (RETIRED) gentoo-dev 2006-08-08 15:35:38 UTC
This one is fixed in 2.6.17 and only affects vanilla-sources, closing.