Date: Wed, 8 Dec 2010 08:19:09 +0300 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses On Wed, Dec 08, 2010 at 07:51:18AM +0300, Solar Designer wrote: > To me, things like this are more important than individual NULL pointer > dereference bugs or the like. So if those get CVEs, this one definitely > should as well. Oh, this was already assigned CVE-2010-4258 by Josh, in response to Dan's posting (same topic, separate thread): http://www.openwall.com/lists/oss-security/2010/12/02/7 Nelson, Dan - there was a "technical detail" behind the "amusing timing" of your messages getting through to the list. It shouldn't happen again for the two of you. ;-) Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.