oss-sec mailing list archives
CVE Request: kernel: socket filters infoleak
From: Eugene Teo <eugene () redhat com>
Date: Wed, 10 Nov 2010 14:44:45 +0800
From Dan Rosenberg, "The "mem" array used as scratch space for socket filters is not initialized, allowing unprivileged users to leak kernel stack bytes."
proposed fix: http://www.spinics.net/lists/netdev/msg146361.html reference: https://bugzilla.redhat.com/show_bug.cgi?id=651698For Dave I guess: http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
Eugene -- main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Current thread:
- CVE Request: kernel: socket filters infoleak Eugene Teo (Nov 09)
- Re: CVE Request: kernel: socket filters infoleak Josh Bressers (Nov 10)