|
Message-ID: <20030321173045.GA31839@openwall.com> Date: Fri, 21 Mar 2003 20:30:45 +0300 From: Solar Designer <solar@...nwall.com> To: announce@...ts.openwall.com Cc: owl-users@...ts.openwall.com Subject: Linux 2.2.25-ow1 Hi, Linux 2.2.25-ow1 is out and a part of Owl-current. The download URL for -ow patches is: http://www.openwall.com/linux/ Linux 2.2.25 fixes the kmod/ptrace race condition vulnerability discovered by Andrzej Szombierski. The vulnerability could result in a local root compromise if the kernel is built with support for auto-loading modules (CONFIG_KMOD) and the path to a module loader program is specified in /proc/sys/kernel/modprobe. It is recommended that you not enable or use kmod, for both security and reliability reasons. The kernels used on Owl CDs have never been built with support for kmod. Owl startup scripts, unlike those used on some other distributions, don't setup a path to modprobe with the kernel. Linux 2.2.24+ also corrects "Etherleak" issues with a number of Ethernet drivers (a common class of vulnerabilities publicized by Ofir Arkin and Josh Anderson of @stake) and a local DoS vulnerability with mmap(2) of /proc/<pid>/mem files discovered by Michal Zalewski of Bindview. Finally, Linux 2.2.25-ow1 patch makes the added RLIMIT_NPROC enforcement also work for 32-bit syscalls on sparc64 (thanks to Brad Spengler for noticing that this was missing). For those who are wondering about 2.4.x, I am going to put out a new version of the patch when 2.4.21 comes out. Meanwhile, if you must use 2.4.x for whatever reason, make sure you aren't using kmod. Some references for the Linux kernel vulnerabilities I've mentioned: The kmod/ptrace race: http://marc.theaimsgroup.com/?l=linux-kernel&m=104791735604202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0127 Etherleak: http://www.atstake.com/research/advisories/2003/a010603-1.txt http://www.kb.cert.org/vuls/id/412115 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0001 mmap(2) of /proc/<pid>/mem DoS: http://razor.bindview.com/publish/advisories/adv_mmap.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1380 -- /sd
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.