lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 11 May 2004 15:05:15 -0700 From: Tom Rini <trini@...nel.crashing.org> To: Shaun Colley <shaunige@...oo.co.uk> Cc: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com Subject: Re: Linux Kernel sctp_setsockopt() Integer Overflow On Tue, May 11, 2004 at 07:58:56PM +0100, Shaun Colley wrote: > ~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~* > > Product: Linux Kernel > Versions: <= 2.4.25 Strictly speaking, 2.4.23-pre5 until 2.4.26. > Bug: Integer overflow > Impact: Attackers may be able to execute > arbitrary code with kernel-level > privileges. > Risk: High > Date: May 11, 2004 > Author: Shaun Colley > Email: shaunige yahoo co uk > WWW: http://www.nettwerked.co.uk [snip] -- Tom Rini http://gate.crashing.org/~trini/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists