Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 28 Nov 2013 23:56:26 +0530 (IST)
From: P J P <>
To: oss security list <>
Subject: Re: CVE Request: Linux kernel: net: uninitialised
 memory leakage

   Hello Hannes,

+-- On Thu, 28 Nov 2013, Hannes Frederic Sowa wrote --+
| This patch does break stuff, a follow-up is needed which did not get to 
| Linus yet, but is already queued up for stable. Otherwise traceroute is 
| broken:

  I see. Thanks so much for the heads-up and link to the follow-up patch.

| I found other leaks in non-inet protocols:
| The protocols where I did remove msg_namelen = 0 where actually
| safe. Some of the protocols I did not touch could leak up to 128 bytes
| of uninitialized data from the stack.
| Hardening against out-of-bounds writes:
| Also there is a small 2-bytes memory leak in extended error reporting:

  Thank you for sharing these too!

Thank you! :)
Prasad J Pandit / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.