Date: Fri, 22 Apr 2011 11:39:58 -0400 (EDT) From: Petr Matousek <pmatouse@...hat.com> To: oss-security@...ts.openwall.com Cc: Vasiliy Kulikov <segoon@...nwall.com> Subject: Re: CVE request: kernel: buffer overflow and DoS issues in agp ----- Original Message ----- > From: "Vasiliy Kulikov" <segoon@...nwall.com> > To: "Petr Matousek" <pmatouse@...hat.com> > Cc: oss-security@...ts.openwall.com > Sent: Friday, April 22, 2011 5:32:51 PM > Subject: Re: [oss-security] CVE request: kernel: buffer overflow and DoS issues in agp > In https://bugzilla.redhat.com/show_bug.cgi?id=698999 it is said > "Reference and patch:", but there is no patch for the issue (as I said > in the patch description). I have no agp hardware and I cannot test > whether forcing the requested pid to the current pid is a good idea > (it might not). Right, copy and paste issue. Fixed. Petr
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ