Date: Thu, 12 Feb 2009 20:05:27 +0000 (GMT) From: Mark J Cox <mjc@...hat.com> To: OSS Security List <oss-security@...ts.openwall.com> Subject: Re: http://www.securityfocus.com/bid/33672/info kernel issue > http://www.securityfocus.com/bid/33672/ seems to be this commit: > http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.28.y.git;a=commit;h=8255fc826e58c0a59711029e01db9fcdc06ba211 > Not sure if its exploitable though. BTW that BID list of affected kernels isn't correct; the multibyte stuff wasn't in <=2.6.18 at least. I didn't check exactly where since it doesn't affect RHEL and didn't look into the issue any further -- but on first glance it seemed like you'd have to be a console user and display/select some carefully chosen characters in order to do the overflow; so it's probably a 'local attacker at keyboard' flaw? Cheers, Mark
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.