uch as you must to protect yourself, just don't support
it. Noone can free you but yourself. (crag, on Debian Planet)
Arne Wichmann (a...@linux.de)
signature.asc
Description: Digital signature
comply as much as you must to protect yourself, just don't support
it. Noone can free you but yourself. (crag, on Debian Planet)
Arne Wichmann (a...@linux.de)
signature.asc
Description: Digital signature
yourself. (crag, on Debian Planet)
Arne Wichmann (a...@linux.de)
signature.asc
Description: Digital signature
Package: linux-2.6
Version: 3.2.16-1
Severity: grave
Tags: security
Justification: user security hole
This seems to have slipped through the kernel-sec repository...
Citing Redhat:
The issue is that the int3 handler uses a per CPU debug stack, and calls
do_traps() with interrupts enabled but pre
to protect yourself, just don't support
it. Noone can free you but yourself. (crag, on Debian Planet)
Arne Wichmann (a...@linux.de)
signature.asc
Description: Digital signature
ou but yourself. (crag, on Debian Planet)
Arne Wichmann (a...@linux.de)
signature.asc
Description: Digital signature
ou but yourself. (crag, on Debian Planet)
Arne Wichmann (a...@linux.de)
signature.asc
Description: Digital signature
Package: linux-2.6
Severity: normal
Hi, there are a number of low urgency security problems (with fixes as far
as I can find them).
CVE-2010-4072 - http://lkml.org/lkml/2010/10/6/454
CVE-2010-4073 - http://lkml.org/lkml/2010/10/6/492
CVE-2010-4075 -
http://lkml.indiana.edu/hypermail//linux/kern
8 matches
Mail list logo