Oliver Pinter <[EMAIL PROTECTED]> wrote:
> for stable (.22 .23 .24) ?
>
> git id in mainline: 900cf086fd2fbad07f72f4575449e0d0958f860f
I sent it to the stable folks a couple days ago.
Thanks,
jon
Jonathan Corbet / LWN.net / [EMAIL PROTECTED]
--
To unsubscribe from this list: send the line
for stable (.22 .23 .24) ?
git id in mainline: 900cf086fd2fbad07f72f4575449e0d0958f860f
--
tested in: http://repo.or.cz/w/linux-2.6.22.y-op.git testing
On 2/12/08, Jonathan Corbet <[EMAIL PROTECTED]> wrote:
> Avoid buffer overflows in get_user_pages()
>
> So I spent a while pounding my head
for stable (.22 .23 .24) ?
git id in mainline: 900cf086fd2fbad07f72f4575449e0d0958f860f
--
tested in: http://repo.or.cz/w/linux-2.6.22.y-op.git testing
On 2/12/08, Jonathan Corbet [EMAIL PROTECTED] wrote:
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against
Oliver Pinter [EMAIL PROTECTED] wrote:
for stable (.22 .23 .24) ?
git id in mainline: 900cf086fd2fbad07f72f4575449e0d0958f860f
I sent it to the stable folks a couple days ago.
Thanks,
jon
Jonathan Corbet / LWN.net / [EMAIL PROTECTED]
--
To unsubscribe from this list: send the line
On Mon, 11 Feb 2008, Andrew Morton wrote:
> > + if (len <= 0)
> > + return 0;
> > /*
> > * Require read or write permissions.
> > * If 'force' is set, we only require the "MAY" flags.
> Can we just convert
> do {
> ...
> } while (len);
> into
>
Andrew Morton <[EMAIL PROTECTED]> wrote:
> On Mon, 11 Feb 2008 16:17:33 -0700 Jonathan Corbet <[EMAIL PROTECTED]> wrote:
>> Avoid buffer overflows in get_user_pages()
>>
>> So I spent a while pounding my head against my monitor trying to figure
>> out the vmsplice() vulnerability - how could a
Andrew Morton [EMAIL PROTECTED] wrote:
On Mon, 11 Feb 2008 16:17:33 -0700 Jonathan Corbet [EMAIL PROTECTED] wrote:
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how could a failure to
On Mon, 11 Feb 2008, Andrew Morton wrote:
+ if (len = 0)
+ return 0;
/*
* Require read or write permissions.
* If 'force' is set, we only require the MAY flags.
Can we just convert
do {
...
} while (len);
into
while (len)
On Mon, 11 Feb 2008 16:17:33 -0700 Jonathan Corbet <[EMAIL PROTECTED]> wrote:
> Avoid buffer overflows in get_user_pages()
>
> So I spent a while pounding my head against my monitor trying to figure
> out the vmsplice() vulnerability - how could a failure to check for
> *read* access turn into a
On Tuesday 12 February 2008 14:16, Robert Hancock wrote:
> Nick Piggin wrote:
> > On Tuesday 12 February 2008 10:17, Jonathan Corbet wrote:
> >> Avoid buffer overflows in get_user_pages()
> >>
> >> So I spent a while pounding my head against my monitor trying to figure
> >> out the vmsplice()
Nick Piggin wrote:
On Tuesday 12 February 2008 10:17, Jonathan Corbet wrote:
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how could a failure to check for
*read* access turn into a root
On Tuesday 12 February 2008 10:17, Jonathan Corbet wrote:
> Avoid buffer overflows in get_user_pages()
>
> So I spent a while pounding my head against my monitor trying to figure
> out the vmsplice() vulnerability - how could a failure to check for
> *read* access turn into a root exploit? It
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how could a failure to check for
*read* access turn into a root exploit? It turns out that it's a buffer
overflow problem which is made easy by
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how could a failure to check for
*read* access turn into a root exploit? It turns out that it's a buffer
overflow problem which is made easy by
On Tuesday 12 February 2008 14:16, Robert Hancock wrote:
Nick Piggin wrote:
On Tuesday 12 February 2008 10:17, Jonathan Corbet wrote:
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how
Nick Piggin wrote:
On Tuesday 12 February 2008 10:17, Jonathan Corbet wrote:
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how could a failure to check for
*read* access turn into a root
On Tuesday 12 February 2008 10:17, Jonathan Corbet wrote:
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how could a failure to check for
*read* access turn into a root exploit? It turns
On Mon, 11 Feb 2008 16:17:33 -0700 Jonathan Corbet [EMAIL PROTECTED] wrote:
Avoid buffer overflows in get_user_pages()
So I spent a while pounding my head against my monitor trying to figure
out the vmsplice() vulnerability - how could a failure to check for
*read* access turn into a root
18 matches
Mail list logo