Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 8 Dec 2010 08:19:09 +0300
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses

On Wed, Dec 08, 2010 at 07:51:18AM +0300, Solar Designer wrote:
> To me, things like this are more important than individual NULL pointer
> dereference bugs or the like.  So if those get CVEs, this one definitely
> should as well.

Oh, this was already assigned CVE-2010-4258 by Josh, in response to
Dan's posting (same topic, separate thread):

http://www.openwall.com/lists/oss-security/2010/12/02/7

Nelson, Dan - there was a "technical detail" behind the "amusing timing"
of your messages getting through to the list.  It shouldn't happen again
for the two of you. ;-)

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.