RE: Second critical mremap() bug found in all Linux kernels

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The mremap() fix in the diff file for the 2.4.24-ow1 kernel patch dates
from January 8, 2004 (
http://www.openwall.com/linux/linux-2.4.24-ow1.tar.gz ).

The exact same code fix in the 2.4.23-ow2 kernel patch dates from
December 18, 2003 (
http://www.openwall.com/linux/linux-2.4.23-ow2.tar.gz ).

Kudos to OpenWall Project for discovering this last year, if they had
realized the implications of this bug they would probably have notified
the kernel developers back then. Perhaps it would be wise for the kernel
developers to look at what other potential issues OWP are proactively
protecting against.



Regards

Thor Larholm
Senior Security Researcher
PivX Solutions
24 Corporate Plaza #180
Newport Beach, CA 92660
http://www.pivx.com
thor@pivx.com
Phone: +1 (949) 231-8496
PGP: 0x5A276569
6BB1 B77F CB62 0D3D 5A82 C65D E1A4 157C 5A27 6569

PivX defines "Proactive Threat Mitigation". Get a FREE Beta Version of
Qwik-Fix
<http://www.qwik-fix.net> 

-----Original Message-----
From: Steve Bremer [mailto:steveb@nebcoinc.com] 
Sent: Wednesday, February 18, 2004 8:05 AM
To: bugtraq@securityfocus.com
Subject: Re: Second critical mremap() bug found in all Linux kernels



I think it's worth noting that those who have been using either the
2.4.23-ow2 or the 2.4.24-ow1 kernel patches from the Openwall Project
are not vulnerable to this latest mremap() bug.

Steve Bremer
NEBCO, Inc.
Systems & Security Administrator


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux