On Mon, Jul 20, 2009 at 12:09:05AM -0400, Michael S Gilbert wrote:
> while this bug is still open, would it make sense to disable the gcc
> option/optimization/bug/flaw that allows this vulnerability to exist?
> the "-fno-delete-null-pointer-checks" flag will completely disable
> this option kernel
cate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
537409: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537409
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.30-1
while this bug is still open, would it make sense to disable the gcc
option/optimization/bug/flaw that allows this vulnerability to exist?
the "-fno-delete-null-pointer-checks" flag will completely disable
this option kernel-wide [1].
obviously there is a tradeoff here. the null pointer optimizat
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894
http://lkml.org/lkml/2009/7/4/14
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3c8a9c63d5fd738c261bd0ceece04d9c8357ca13
Package: linux-image-2.6.30-1-amd64
Version: 2.6.30-2
Severity: critical
Tags: security patch
Justification: root security hole
From: Mariusz Kozlowski
Date: Sun, 5 Jul 2009 19:48:35 + (+)
Subject: tun/tap: Fix crashes if open() /dev/net/tun and then poll() it.
X-Git-Tag: v2.6.31-rc3~40^2
6 matches
Mail list logo