lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031202164309.GB6056@deneb.enyo.de> From: fw at deneb.enyo.de (Florian Weimer) Subject: [SECURITY] [DSA-403-1] userland can access Linux kernel memory Wojciech Purczynski wrote: > This is not an integer overflow bug. do_brk() doesn't verify its arguments > at all, allowing to create arbitrarily large virtual memory mapping (vma) > consuming kernel memory. At least this explains why it wasn't found by the Stanford checker tool. Thanks.