Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 20 Jul 2009 15:29:09 +0400
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux 2.6.30+/SELinux/RHEL5 test kernel 0day, exploiting the unexploitable

Marcus,

On Mon, Jul 20, 2009 at 12:01:47PM +0200, Marcus Meissner wrote:
> - fixed the personality - PER_CLEAR_ON_SETTID inheritance issue (CVE-2009-1895)
>   to work around mmap_min_addr protection.
>   Affects 2.6.23-2.6.30.1

What makes you think this does not affect earlier kernels?  This does
not match my analysis, but maybe I am missing something, hence I ask.

BTW, as you're aware, this fix is a hardening measure for/against
SUID-root programs with a certain class of design errors in them; it is
not exactly a fix for the kernel itself, although it should be in the
kernel.  I do not mean to downplay the issue, but I think it is
important that we distinguish the different types of changes that we are
making in response to Brad's exploit.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.