Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 Jan 2016 12:06:01 +0100
From: Florian Weimer <fweimer@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - Roaming through the
 OpenSSH client: CVE-2016-0777 and CVE-2016-0778

On 01/14/2016 06:13 PM, Qualys Security Advisory wrote:
> Internal stdio buffering is the most severe of the three problems
> discussed in this section, although GNU/Linux is not affected because
> the glibc mmap()s and munmap()s (and therefore cleanses) stdio buffers.

This will change in glibc 2.23, stdio will use regular malloc and free
for its buffers.  I did not expect this change to have security
implications.  Considering that the actual bug lies elsewhere, and stdio
usage is based on copying out of the buffer (so leaks can still happen
elsewhere), I do not wish to revert this change.

Florian

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ