oss-sec mailing list archives
Re: CVE Request: kernel: socket filters infoleak
From: Josh Bressers <bressers () redhat com>
Date: Wed, 10 Nov 2010 14:33:21 -0500 (EST)
Please use CVE-2010-4158 Thanks. -- JB ----- "Eugene Teo" <eugene () redhat com> wrote:
From Dan Rosenberg, "The "mem" array used as scratch space for socket filters is not initialized, allowing unprivileged users to leak kernel stack bytes." proposed fix: http://www.spinics.net/lists/netdev/msg146361.html reference: https://bugzilla.redhat.com/show_bug.cgi?id=651698 For Dave I guess: http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html Eugene -- main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Current thread:
- CVE Request: kernel: socket filters infoleak Eugene Teo (Nov 09)
- Re: CVE Request: kernel: socket filters infoleak Josh Bressers (Nov 10)