OpenBSD patch: XMM exceptions incorrectly handled in i386 kernel

Credit: Slava Pestov
Risk: Low
Local: Yes
Remote: No
CWE: CWE-Other

CVSS Base Score: 4.9/10
Impact Subscore: 6.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

XMM exceptions are incorrectly handled in the OpenBSD/i386 kernel, resulting in a kernel panic that can be triggered by a local user. This issue has been fixed in -current. Source code patches are available for OpenBSD 4.4, 4.5 and 4.6. Patch for OpenBSD 4.6: Patch for OpenBSD 4.5: Patch for OpenBSD 4.4: These patches are also available in the OPENBSD_4_6, OPENBSD_4_5 and OPENBSD_4_4 patch branches. Thanks to Slava Pestov for reporting this issue.


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top