Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 28 Feb 2013 00:33:00 +0100 (CET)
From: Jiri Kosina <jikos@...os.cz>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based buffer
 overflow

On Wed, 27 Feb 2013, Greg KH wrote:

> > Hmm, I wonder if perhaps the solution here isn't about spending a lot
> > of time analyzing hundreds of potentially serious bugs and notifying
> > the world about them all in an accurate way.  Perhaps the solution is
> > changing the development model or architecture of the kernel such that
> > there aren't so many bugs with *serious* impact in the first place.
> > 
> > Ooops... did I say that out loud?  
> 
> There's nothing wrong with that, and we have made many changes in the
> kernel to help mitigate problems before they occur.
> 
> If you know of any other ways that we can do this, please let us know.

- W^X
- not letting kernel dereference userspace pointers (and PMAP is not 
  available everywhere, unfortunately)

-- 
Jiri Kosina

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.