** Description changed: - regset: Prevent null pointer reference on readonly regsets + The regset (aka register set) feature in the Linux kernel before 3.2.10 + does not properly handle the absence of .get and .set methods, which + allows local users to cause a denial of service (NULL pointer + dereference) or possibly have unspecified other impact via a (1) + PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call. Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 c8e252586f8d5de906385d8cf6385fee289a825e Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 5189fa19a4b2b4c3bec37c3a019d446148827717
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs