Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <s0864c0d.015@gw.nebcoinc.com>
Date: Wed, 21 Apr 2004 10:25:07 -0500
From: "Steve Bremer" <steveb@...coinc.com>
To: <owl-users@...ts.openwall.com>
Subject: Re: Linux 2.4.26-ow1, 2.0.40-ow1; new Owl ISO; Owl 1.1-stable

In response to Tomasz's question, I don't see anything that would
prevent this vulnerability in the Openwall Linux kernel patch.  However,
and I'm still trying to find an answer to this myself, it may be that a
kernel that is compiled without CONFIG_IP_MULTICAST is not vulnerable. 
I've been trying to poke around in the code to find an answer, but
haven't had much luck finding an answer so far (I'm not a kernel/systems
programmer by a long shot).

Steve Bremer
NEBCO, Inc.
Systems & Security Administrator

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.