![]() |
|
Message-ID: <ff3b453-2b4-b451-70a7-a6bc68887437@gathman.org> Date: Mon, 22 Sep 2025 17:12:20 -0400 (EDT) From: Stuart D Gathman <stuart@...hman.org> To: oss-security@...ts.openwall.com cc: openssh@...nssh.com Subject: Re: CVE-2023-51767: a bogus CVE in OpenSSH On Mon, 22 Sep 2025, Damien Miller wrote: > It is based on this paper "Mayhem: Targeted Corruption of Register and > Stack Variables" by Adiletta, et al. > https://arxiv.org/pdf/2309.02545 > > Firstly, we do not consider it to be the application's responsibility > to defend against platform achitectural weaknesses. We're happy > to adopt platform measures (e.g. toolchain defences) where it is > possible to do so, but fundamentally it is the platform's job to Amen. Plus, some of us prefer slower and reliable to fast and fragile Question: is this attack mitigated by ECC ram? (It seems to be a weak RAM issue.) The paper say no: "Further, [8] showed that ECC, a hardware-enabled error checking built into many memory devices, can also be bypassed." Question: will this vulnerability be incorporated in MEMTEST86? > Unfortunately, at no stage of the CVE issuance process was OpenSSH > contacted about this advisory either. This seems pretty suboptimal as > a process. > > Posting this for the record and in the hope that someone will help > get the CVE disputed. I have no clue how to help. But will do so if informed.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.