|
Date: Thu, 11 Nov 2004 20:50:41 +0300 From: Solar Designer <solar@...nwall.com> To: owl-users@...ts.openwall.com Subject: Re: iSEC advisory about binfmt_elf On Thu, Nov 11, 2004 at 07:43:12PM +0300, Ilya Andreiv wrote: > This advisory comes from the following location : > http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt > > Is 2.4.27-ow1 kernel affected? Yes, and yes we are aware of these issues (and had plenty of advance notification, along with other vendors). While I do feel somewhat guilty for not dedicating enough time to preparing an update before this was made public, I do not consider these to be terribly bad (compared to other crap I'm sure we still have in the kernel...) The only confirmed impact is being able to read +s-r executables. The potential for a local root compromise is just theory at this point (although there _might_ be a way to exploit one of the flaws in such a way). An updated -ow patch will be coming. Whether I will put one out really soon or whether I'll hold to also include some other fixes is not decided yet. FWIW, one of these bugs was fixed in 2.2.14-ow1+ and 2.2.15 official, but the fix was never rolled into 2.4.x+ as it turns out. I did not check 2.2.x for the other bugs yet. -- Alexander Peslyak <solar at openwall.com> GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598 http://www.openwall.com - bringing security into open computing environments
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.