|
Message-Id: <s0864c0d.015@gw.nebcoinc.com> Date: Wed, 21 Apr 2004 10:25:07 -0500 From: "Steve Bremer" <steveb@...coinc.com> To: <owl-users@...ts.openwall.com> Subject: Re: Linux 2.4.26-ow1, 2.0.40-ow1; new Owl ISO; Owl 1.1-stable In response to Tomasz's question, I don't see anything that would prevent this vulnerability in the Openwall Linux kernel patch. However, and I'm still trying to find an answer to this myself, it may be that a kernel that is compiled without CONFIG_IP_MULTICAST is not vulnerable. I've been trying to poke around in the code to find an answer, but haven't had much luck finding an answer so far (I'm not a kernel/systems programmer by a long shot). Steve Bremer NEBCO, Inc. Systems & Security Administrator
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.