[LTP] [PATCH] cve-2015-3290: Fix tst_syscall() return value

Martin Doucha mdoucha@suse.cz
Wed Feb 15 16:51:44 CET 2023


On 15. 02. 23 16:34, Teo Couprie Diaz wrote:
> I sent the tst_syscall return patch. I did some testing with what systems I
> had available when working on it and, at the time, didn't see any 
> regressions,
> including for cve-2015-3290.
> 
> However this was with fairly recent kernels and libcs, and according to 
> Martin
> the test failed for them on an older combination.
> 
> I shared the test suite[0] I tested the patch with, containing all the 
> uses I found.
> It might be worthwhile to run it on a system where we now know one of 
> the tests
> was affected ? Hopefully, none more, but having a result would be better.

Yes, we got failures on some older distros with kernel 4.x and older 
glibc. I've already tested the patch there myself. The CVE test works 
fine on kernels 5.x with newer glibc.

-- 
Martin Doucha   mdoucha@suse.cz
QA Engineer for Software Maintenance
SUSE LINUX, s.r.o.
CORSO IIa
Krizikova 148/34
186 00 Prague 8
Czech Republic



More information about the ltp mailing list