Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20101022230830.GA22808@openwall.com>
Date: Sat, 23 Oct 2010 03:08:30 +0400
From: Solar Designer <solar@...nwall.com>
To: owl-users@...ts.openwall.com, announce@...ts.openwall.com
Subject: [openwall-announce] glibc bugs: not in Owl

Hi,

In case some of you are wondering why there's no glibc security update
for Owl when almost all major distros are releasing critical security
updates now, the answer is simple: Owl is not vulnerable to
CVE-2010-3847 and CVE-2010-3856 (both discovered by Tavis Ormandy).
This is for several reasons, including due to glibc source code
hardening we introduced many years ago (the "sanitize-env" patch).

For some context, here are Tavis' postings on the bugs:

http://lists.openwall.net/full-disclosure/2010/10/18/7
http://lists.openwall.net/full-disclosure/2010/10/22/15

Similarly not vulnerable are ALT Linux distributions, who have
forward-ported the "sanitize-env" changes to newer versions of glibc:

http://www.altlinux.com

I am not aware of other Linux distros reusing our glibc hardening code,
so any other distro with glibc 2.4+ should be presumed vulnerable...

Meanwhile, we've introduced security fixes to some PAM modules not used
on Owl by default, and we've updated many packages since the last ISO
snapshot (binutils, hdparm, ed, man-pages, diffstat, flex, ncurses, VIM,
and Linux-PAM):

http://www.openwall.com/Owl/CHANGES-current.shtml

...and there's now an RSS feed on that page (for the change log).

There's no new ISO snapshot yet, though.  When there is, it will
contain these updates and more (to be announced separately).

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.