Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 30 Nov 2010 07:38:00 +0100
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Cc: Eugene Teo <eugene@...hat.com>
Subject: Re: CVE request: kernel: Multiple DoS issues in block layer

Am Dienstag 30 November 2010 05:58:38 schrieb Eugene Teo:
> On 11/29/2010 10:24 PM, Eugene Teo wrote:
> >>> 2. By submitting certain I/O requests with 0 length, a local user could
> >>> cause a kernel panic:
> >>>
> >>> http://git.kernel.org/?p=linux/kernel/git/axboe/linux-2.6-block.git;a=c
> >>>ommit;h=9284bcf4e335e5f18a8bc7b26461c33ab60d0689
> >>
> >> Use CVE-2010-4163
> >
> > Not a complete patch, need this too:
> > https://patchwork.kernel.org/patch/363282/
> 
> Has anyone released an update with the regression? If so, we probably
> need a new CVE name for this.

No. :)

Cheers,
Thomas

-- 
 Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing
 SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
--
  Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
                            -- Marie von Ebner-Eschenbach

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ