lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040515220850.GA11730@e-matters.de> From: s.esser at e-matters.de (Stefan Esser) Subject: Re: Linux Kernel sctp_setsockopt() Integer Overflow > How did you come from the above snippet of the code to the idea that > kmalloc(0) returns NULL? Doesn't matter: the first thing linux's sys_setsockopt() does is checking if optlen is < 0. It will fail in this case. So the needed optlen is never handled down to the protocol setsockopt function. Otherwise you would find several protocol handlers vulnerable... f.e. IPv6... Stefan Esser -- -------------------------------------------------------------------------- Stefan Esser s.esser@...atters.de e-matters Security http://security.e-matters.de/ GPG-Key gpg --keyserver pgp.mit.edu --recv-key 0xCF6CAE69 Key fingerprint B418 B290 ACC0 C8E5 8292 8B72 D6B0 7704 CF6C AE69 -------------------------------------------------------------------------- Did I help you? Consider a gift: http://wishlist.suspekt.org/ --------------------------------------------------------------------------