Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20040421160624.GA7319@openwall.com>
Date: Wed, 21 Apr 2004 20:06:24 +0400
From: Solar Designer <solar@...nwall.com>
To: owl-users@...ts.openwall.com
Subject: Re: Linux 2.4.26-ow1, 2.0.40-ow1; new Owl ISO; Owl 1.1-stable

Hi Steve,

On Wed, Apr 21, 2004 at 10:25:07AM -0500, Steve Bremer wrote:
> In response to Tomasz's question, I don't see anything that would
> prevent this vulnerability in the Openwall Linux kernel patch.

Correct.

> However,
> and I'm still trying to find an answer to this myself, it may be that a
> kernel that is compiled without CONFIG_IP_MULTICAST is not vulnerable. 

Unfortunately, it does not appear so.

-- 
Alexander Peslyak <solar@...nwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.