[LTP] [PATCH] cve-2015-3290: Fix tst_syscall() return value
Martin Doucha
mdoucha@suse.cz
Wed Feb 15 16:51:44 CET 2023
On 15. 02. 23 16:34, Teo Couprie Diaz wrote:
> I sent the tst_syscall return patch. I did some testing with what systems I
> had available when working on it and, at the time, didn't see any
> regressions,
> including for cve-2015-3290.
>
> However this was with fairly recent kernels and libcs, and according to
> Martin
> the test failed for them on an older combination.
>
> I shared the test suite[0] I tested the patch with, containing all the
> uses I found.
> It might be worthwhile to run it on a system where we now know one of
> the tests
> was affected ? Hopefully, none more, but having a result would be better.
Yes, we got failures on some older distros with kernel 4.x and older
glibc. I've already tested the patch there myself. The CVE test works
fine on kernels 5.x with newer glibc.
--
Martin Doucha mdoucha@suse.cz
QA Engineer for Software Maintenance
SUSE LINUX, s.r.o.
CORSO IIa
Krizikova 148/34
186 00 Prague 8
Czech Republic
More information about the ltp
mailing list