Bug#537409: info

2009-07-19 Thread dann frazier
On Mon, Jul 20, 2009 at 12:09:05AM -0400, Michael S Gilbert wrote: > while this bug is still open, would it make sense to disable the gcc > option/optimization/bug/flaw that allows this vulnerability to exist? > the "-fno-delete-null-pointer-checks" flag will completely disable > this option kernel

Bug#537409: marked as done (linux-image-2.6.30-1-amd64: 2.6.30+/RHEL5 2.6.18 local kernel exploit in /dev/net/tun)

2009-07-19 Thread Debian Bug Tracking System
cate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 537409: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537409 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: linux-image-2.6.30-1

Bug#537409: info

2009-07-19 Thread Michael S Gilbert
while this bug is still open, would it make sense to disable the gcc option/optimization/bug/flaw that allows this vulnerability to exist? the "-fno-delete-null-pointer-checks" flag will completely disable this option kernel-wide [1]. obviously there is a tradeoff here. the null pointer optimizat

Bug#537409: CVE-2009-1894

2009-07-17 Thread Юрий Колесников
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894

Bug#537409:

2009-07-17 Thread Юрий Колесников
http://lkml.org/lkml/2009/7/4/14 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3c8a9c63d5fd738c261bd0ceece04d9c8357ca13

Bug#537409: linux-image-2.6.30-1-amd64: 2.6.30+/RHEL5 2.6.18 local kernel exploit in /dev/net/tun

2009-07-17 Thread Yuriy Kolesnikov
Package: linux-image-2.6.30-1-amd64 Version: 2.6.30-2 Severity: critical Tags: security patch Justification: root security hole From: Mariusz Kozlowski Date: Sun, 5 Jul 2009 19:48:35 + (+) Subject: tun/tap: Fix crashes if open() /dev/net/tun and then poll() it. X-Git-Tag: v2.6.31-rc3~40^2