[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: kernel: timekeeping: Prevent oops
From:       Josh Bressers <bressers () redhat ! com>
Date:       2010-06-25 16:25:43
Message-ID: 1459656894.1199601277483143500.JavaMail.root () zmail01 ! collab ! prod ! int ! phx2 ! redhat ! com
[Download RAW message or body]

Please use CVE-2010-2243 for this.

Thanks.

----- "Eugene Teo" <eugeneteo@kernel.sg> wrote:

> "Aaro Koskinen reported an issue in kernel.org bugzilla #15366, where
> on 
> non-GENERIC_TIME systems, accessing 
> /sys/devices/system/clocksource/clocksource0/current_clocksource
> results 
> in an oops.
> 
> It seems the timekeeper/clocksource rework missed initializing the 
> curr_clocksource value in the !GENERIC_TIME case."
> 
> Upstream commit:
> http://git.kernel.org/linus/ad6759fbf35d104dbf573cd6f4c6784ad6823f7e
> 
> I believe distros are using GENERIC_TIME=y, at least this is the case
> in 
> our supported kernels.
> 
> Thanks, Eugene
> -- 
> main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i);
> }
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic