** Description changed:

- regset: Prevent null pointer reference on readonly regsets
+ The regset (aka register set) feature in the Linux kernel before 3.2.10
+ does not properly handle the absence of .get and .set methods, which
+ allows local users to cause a denial of service (NULL pointer
+ dereference) or possibly have unspecified other impact via a (1)
+ PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
  
  Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 
c8e252586f8d5de906385d8cf6385fee289a825e
  Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 
5189fa19a4b2b4c3bec37c3a019d446148827717

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to