Horms wrote: [snip] > The patch from ultramonkey.org above was fished out of > a Red Hat Kernel RPM (by me). It still seems to be used > in their latest kernel (27.0.1.EL.um.1), so I am going to apply that. > But for the other architectures (mips and alpha) there does not > seem to be a fix available.
Mips uses the generic version, the non-padding assembly one does only to_user/from_user, which is uncritical. > To be honest I am pretty dubious about the security tag > on this bug, I don't believe there is a known exploit > and at best the bug seems to be regarded as being minor. > Would it be acceptable to remove the security tag? It could lead to involuntary disclosure of sensitive data. > Would you be happy to have the bug closed by application of the patch > you suggested? Or do you want to hold it open because of the > outstanding mips and alpha problem? I am pretty tempted to mark it as > upstream and wontfix and reprioritise as wishlist if that is the case. > Perhaps splitting and reassigning to the relevant misps and alpha > kernel-image packages. AFAICS reassigning to alpha is ok. Thiemo -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]