Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090212202259.GC25522@suse.de>
Date: Thu, 12 Feb 2009 21:22:59 +0100
From: Marcus Meissner <meissner@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: http://www.securityfocus.com/bid/33672/info kernel issue

On Thu, Feb 12, 2009 at 08:05:27PM +0000, Mark J Cox wrote:
> >http://www.securityfocus.com/bid/33672/ seems to be this commit:
> >http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.28.y.git;a=commit;h=8255fc826e58c0a59711029e01db9fcdc06ba211
> >Not sure if its exploitable though.
> 
> BTW that BID list of affected kernels isn't correct; the multibyte stuff 
> wasn't in <=2.6.18 at least.
> 
> I didn't check exactly where since it doesn't affect RHEL and didn't look 
> into the issue any further -- but on first glance it seemed like you'd 
> have to be a console user and display/select some carefully chosen 
> characters in order to do the overflow; so it's probably a 'local attacker 
> at keyboard' flaw?

We backported Unicode stuff to SLES 10 I just see, but yes, 2.6.18 then.

Yes, console user only. And you can overflow 2 bytes over the end of kmalloced
space, not sure how much you can do with this.

ciao, Marcus

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.