OpenBSD patch: XMM exceptions incorrectly handled in i386 kernel

2009-10-07 / 2009-10-08
Credit: Slava Pestov
Risk: Low
Local: Yes
Remote: No
CWE: CWE-Other


CVSS Base Score: 4.9/10
Impact Subscore: 6.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

XMM exceptions are incorrectly handled in the OpenBSD/i386 kernel, resulting in a kernel panic that can be triggered by a local user. This issue has been fixed in -current. Source code patches are available for OpenBSD 4.4, 4.5 and 4.6. Patch for OpenBSD 4.6: ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/i386/002_xmm.patch Patch for OpenBSD 4.5: ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/008_xmm.patch Patch for OpenBSD 4.4: ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/i386/015_xmm.patch These patches are also available in the OPENBSD_4_6, OPENBSD_4_5 and OPENBSD_4_4 patch branches. Thanks to Slava Pestov for reporting this issue.

References:

http://www.openbsd.org/errata46.html
http://www.openbsd.org/errata45.html
http://www.openbsd.org/errata44.html
http://marc.info/?l=openbsd-security-announce&m=125474331811594
http://www.securityfocus.com/bid/36589
http://secunia.com/advisories/36956


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top