oss-sec mailing list archives

CVE Request: kernel: socket filters infoleak


From: Eugene Teo <eugene () redhat com>
Date: Wed, 10 Nov 2010 14:44:45 +0800

From Dan Rosenberg, "The "mem" array used as scratch space for socket filters is not initialized, allowing unprivileged users to leak kernel stack bytes."

proposed fix: http://www.spinics.net/lists/netdev/msg146361.html

reference: https://bugzilla.redhat.com/show_bug.cgi?id=651698

For Dave I guess: http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html

Eugene
--
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }


Current thread: