From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1766008AbYEVOC5 (ORCPT ); Thu, 22 May 2008 10:02:57 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755198AbYEVOCt (ORCPT ); Thu, 22 May 2008 10:02:49 -0400 Received: from testure.choralone.org ([194.9.77.134]:55423 "EHLO testure.choralone.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755064AbYEVOCs (ORCPT ); Thu, 22 May 2008 10:02:48 -0400 Date: Thu, 22 May 2008 10:04:02 -0400 From: Dave Jones To: Andrew Morgan Cc: Linux Kernel , bojan@rexursive.com Subject: capget() overflows buffers. Message-ID: <20080522140402.GB2071@codemonkey.org.uk> Mail-Followup-To: Dave Jones , Andrew Morgan , Linux Kernel , bojan@rexursive.com MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.17+20080114 (2008-01-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We had a user file a bug report recently that sys_capget is overflowing a user buffer. More details and test program are available at https://bugzilla.redhat.com/show_bug.cgi?id=447518 The only recent change in this area was e338d263a76af78fe8f38a72131188b58fceb591 "Add 64-bit capability support to the kernel". Dave -- http://www.codemonkey.org.uk