|
Message-ID: <5e5fcc5b94cbcd6eb83fcfd3e73f0f08c0cba7e2.camel@debian.org> Date: Mon, 29 Jul 2024 09:02:33 +0200 From: Yves-Alexis Perez <corsac@...ian.org> To: oss-security@...ts.openwall.com Subject: Re: ASLRn't is still alive and well on x86 kernels, despite CVE-2024-26621 patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On Mon, 2024-07-08 at 12:37 -0400, Will Dormann wrote: > - Modern x86 systems with the CVE-2024-26621 patch will NOT ranzomize > the load address of large libraries. (i.e. is still vulnerable to > "ASLRn't" despite the patch) So it turns out this was because the patch addressing CVE-2024-26621 (4ef9ad19e17676b9ef071309bc62020e2373705d) did so using CONFIG_32BIT which is (perhaps surprisingly) *not* defined on IA-32. d9592025000b3cf26c742f3505da7b83aedc26d5 was recently merged to Linus tree switching to !IS_ENABLED(CONFIG_64BIT) which should work on all architectures. So ASLRn't *should* be fixed on IA-32 kernels with 6.11. Regards, - -- Yves-Alexis -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmanPokACgkQ3rYcyPpX RFvvbgf9FxMoxKSPfurTVA4wavVh2wQ397KBfPEz1QtKwHqrmZR4TfEJOlzsC2BM h/6Vk+uJK70ByaKvR1j8fdYMUKniIM5GAAfNdpbPpsTgMLHGjHrj/89zG2R2YxIN GwuY00rOyUXRF8hpfMCACnGatRJQqTcnr+Bdb6abYkxxTQLTu9vK/gj+A/eJOw2y ayj/SOd4hnSl7725A8rTiiW53mdE3jDhxLNHnTU8Ucdwd2SFNk81bu3j0EWkcw6V J5DFcGGhiIPIWb6e2ff3ucOLBFwXkuhxJqoocwaQEdwtBqq5Ui7MWHfM1fpdHgNH k+JbdP0eXtrUgbSjLiQfzYwMPTeLVw== =zO5O -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.