Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 11 Nov 2004 20:50:41 +0300
From: Solar Designer <>
Subject: Re: iSEC advisory about binfmt_elf

On Thu, Nov 11, 2004 at 07:43:12PM +0300, Ilya Andreiv wrote:
> This advisory comes from the following location :
> Is 2.4.27-ow1 kernel affected?

Yes, and yes we are aware of these issues (and had plenty of advance
notification, along with other vendors).  While I do feel somewhat
guilty for not dedicating enough time to preparing an update before
this was made public, I do not consider these to be terribly bad
(compared to other crap I'm sure we still have in the kernel...)

The only confirmed impact is being able to read +s-r executables.  The
potential for a local root compromise is just theory at this point
(although there _might_ be a way to exploit one of the flaws in such a

An updated -ow patch will be coming.  Whether I will put one out
really soon or whether I'll hold to also include some other fixes is
not decided yet.

FWIW, one of these bugs was fixed in 2.2.14-ow1+ and 2.2.15 official,
but the fix was never rolled into 2.4.x+ as it turns out.  I did not
check 2.2.x for the other bugs yet.

Alexander Peslyak <solar at>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598 - bringing security into open computing environments

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.