Is anyone else disturbed by the number of system level compromises the Linux kernel has seen in recent history?
We have the newly discovered mremap() vulnerability (as seen on /. et al), the brk() vulnerability from a little more than a month ago, and the ptrace vulnerability from last March (which is the second ptrace() vulnerability in recent history)
That's three system level compromises in the kernel alone within a period of a year, in a system which is supposedly seeing the same degree of regression testing as commercial Unix systems. Comparitively, Solaris has had not had a kernel vulnerability resulting in a system level compromise in over a year.
Now granted, OpenBSD, reknowned for its security, saw itself afflicted with a local root vulnerability due to a race condition which was very similar to the ptrace() vulnerability on Linux. But with buffer overflow issues in system calls, isn't it time some of these companies that are staking their future on Linux, such as IBM, SGI, and Novell, pay to have the code implementing the entire Linux system call table thoroughly audited? It seems ludicrous that we are seeing buffer overflows in the system calls of an operating system that's over a decade mature.
We have the newly discovered mremap() vulnerability (as seen on /. et al), the brk() vulnerability from a little more than a month ago, and the ptrace vulnerability from last March (which is the second ptrace() vulnerability in recent history)
That's three system level compromises in the kernel alone within a period of a year, in a system which is supposedly seeing the same degree of regression testing as commercial Unix systems. Comparitively, Solaris has had not had a kernel vulnerability resulting in a system level compromise in over a year.
Now granted, OpenBSD, reknowned for its security, saw itself afflicted with a local root vulnerability due to a race condition which was very similar to the ptrace() vulnerability on Linux. But with buffer overflow issues in system calls, isn't it time some of these companies that are staking their future on Linux, such as IBM, SGI, and Novell, pay to have the code implementing the entire Linux system call table thoroughly audited? It seems ludicrous that we are seeing buffer overflows in the system calls of an operating system that's over a decade mature.
Comment