Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 22 Apr 2011 11:39:58 -0400 (EDT)
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Vasiliy Kulikov <segoon@...nwall.com>
Subject: Re: CVE request: kernel: buffer overflow and DoS
 issues in agp

----- Original Message -----
> From: "Vasiliy Kulikov" <segoon@...nwall.com>
> To: "Petr Matousek" <pmatouse@...hat.com>
> Cc: oss-security@...ts.openwall.com
> Sent: Friday, April 22, 2011 5:32:51 PM
> Subject: Re: [oss-security] CVE request: kernel: buffer overflow and DoS issues in agp
> In https://bugzilla.redhat.com/show_bug.cgi?id=698999 it is said
> "Reference and patch:", but there is no patch for the issue (as I said
> in the patch description). I have no agp hardware and I cannot test
> whether forcing the requested pid to the current pid is a good idea
> (it might not).

Right, copy and paste issue. Fixed.

Petr

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ