Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 15 Dec 2015 15:30:02 +0100
From: Marcus Meissner <>
To: OSS Security List <>
Subject: CVE Request: Linux Kernel: information leak from getsockname


spotted by grsecurity

getsockname() for some socket families did not check the length of the passed sockaddr,
copying out more kernel memory than required, leaking information from the kernel stack,
including kernel addresses. This can be used for KASLR bypass or other information leaks. 

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ