Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 15 Jun 2010 14:53:36 +0800
From: Eugene Teo <>
CC: dann frazier <>,
        "Steven M. Christey" <>
Subject: Re: CVE Request - kernel: put_tty_queue NULL pointer

On 06/15/2010 02:31 PM, dann frazier wrote:
> Going through some old issues, we have this one from 2009:
> Upstream fix went into 2.6.33-rc8:
> This was included in and, but it looks like our
> 2.6.26-based kernel may have the issue as well.

Also see,

If memory serves me well, it should affect kernels v2.6.21-rc1 onwards 
with the commit ab521dc0.

Thanks, Eugene
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ