Handle bogus %cs selector in single-step instruction decoding (CVE-2007-3731)
commit975dd332b3f2a9f5efe604dc068aa7dc4b253d39
authorGreg KH <gregkh@suse.de>
Fri, 22 Feb 2008 21:31:22 +0000 (22 13:31 -0800)
committerOliver Pinter <oliver.pntr@gmail.com>
Sat, 23 Feb 2008 20:05:15 +0000 (23 21:05 +0100)
treebb5c8c8b2740dbb07446499dad294b4730fbb201
parentbf1cdb9b1462fb3d1f5458e0764eea6c44f39c33
Handle bogus %cs selector in single-step instruction decoding (CVE-2007-3731)

2.6.22-stable review patch.  If anyone has any objections, please let us
know.

------------------

From: Roland McGrath <roland@redhat.com>

Handle bogus %cs selector in single-step instruction decoding

mainline: 29eb51101c02df517ca64ec472d7501127ad1da8

The code for LDT segment selectors was not robust in the face of a bogus
selector set in %cs via ptrace before the single-step was done.

Signed-off-by: Roland McGrath <roland@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Acked-by: Jeff Mahoney <jeffm@suse.com>
CC: Oliver Pinter <oliver.pntr@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Signed-off-by: Oliver Pinter <oliver.pntr@gmail.com>
arch/i386/kernel/ptrace.c
arch/x86_64/kernel/ptrace.c