Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 04 Nov 2010 17:59:24 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Dan Rosenberg <dan.j.rosenberg@...il.com>
Subject: Re: CVE request: kernel: CAN information leak

On 11/04/2010 06:19 AM, Dan Rosenberg wrote:
> The CAN protocol uses the address of a kernel heap object as a proc
> filename, revealing information that could be useful during
> exploitation.
>
> The below post also mentions a heap overflow.  While there is a
> semantic overflow (17 bytes being copied into a 9-byte buffer), in
> reality, the object whose member is being overflowed resides in a
> kernel heap slab cache that includes enough padding that there is no
> possible corruption.  So, it's a bug but not a vulnerability.
>
> Reference:
> http://marc.info/?l=linux-netdev&m=128872251418192&w=2

Please use CVE-2010-3874.

Thanks, Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.