Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130227235757.GA1991@kroah.com>
Date: Wed, 27 Feb 2013 15:57:57 -0800
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based
 buffer overflow

On Thu, Feb 28, 2013 at 12:33:00AM +0100, Jiri Kosina wrote:
> On Wed, 27 Feb 2013, Greg KH wrote:
> 
> > > Hmm, I wonder if perhaps the solution here isn't about spending a lot
> > > of time analyzing hundreds of potentially serious bugs and notifying
> > > the world about them all in an accurate way.  Perhaps the solution is
> > > changing the development model or architecture of the kernel such that
> > > there aren't so many bugs with *serious* impact in the first place.
> > > 
> > > Ooops... did I say that out loud?  
> > 
> > There's nothing wrong with that, and we have made many changes in the
> > kernel to help mitigate problems before they occur.
> > 
> > If you know of any other ways that we can do this, please let us know.
> 
> - W^X

I thought we tried this, and had to revert it due to problems it caused
with some dyanmic code generators.  Or am I totally mistaken here?

> - not letting kernel dereference userspace pointers (and PMAP is not 
>   available everywhere, unfortunately)

What do you mean by this?

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.