On Wed, Nov 04, 2009 at 02:57:59AM +0100, Claire beuserie wrote:
> Hi,
> 
> On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt <[email protected]>wrote:
> 
> > 2) At least three of our developers were aware of this exploitation
> >   method going back perhaps two years before than the commit, but we
> >   gnashed our teeth a lot to try to find other solutions.  Clever
> >   cpu architectures don't have this issue because the virtual address
> >   spaces are seperate, so i386/amd64 are the ones with the big impact.
> >   We did think long and hard about tlb bashing page 0 everytime we
> >   switch into the kernel, but it still does not look attractive from
> >   a performance standpoint.
> >
> 
> I'm confused.
> 
> That came out a bit weird: are you saying you knew about the bug for 2 years
> but did not fix it?

It's not "the bug", it's a class of vulnerabilities that allows to
exploit a NULL pointer dereference under certain circumstances.

http://packetstorm.linuxsecurity.com/poisonpen/8lgm/ptchown.c
is commonly cited as the oldest public source (1994). Use google for
more.

> 
> 
> c.b-

-- 
Sent from my noname server.

Reply via email to