oss-sec mailing list archives

Re: CVE Request: kernel: socket filters infoleak


From: Josh Bressers <bressers () redhat com>
Date: Wed, 10 Nov 2010 14:33:21 -0500 (EST)

Please use CVE-2010-4158

Thanks.

-- 
    JB


----- "Eugene Teo" <eugene () redhat com> wrote:

From Dan Rosenberg, "The "mem" array used as scratch space for socket

filters is not initialized, allowing unprivileged users to leak kernel

stack bytes."

proposed fix: http://www.spinics.net/lists/netdev/msg146361.html

reference: https://bugzilla.redhat.com/show_bug.cgi?id=651698

For Dave I guess: 
http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html

Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i);
}


Current thread: