lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BF9651D8732ED311A61D00105A9CA315166FED77@berkeley.gci.com> From: lsawyer at gci.com (Leif Sawyer) Subject: RE: Linux kernel scm_send local DoS > From: Paul Starzetz [mailto:ihaquer@...c.pl] > > A locally exploitable flaw has been found in the Linux > socket layer, that allows a local user to hang a vulnerable > machine. Tested on UltraSparc 32-bit userland, Gentoo 2004.3 2.6.7-rc2 SMP Results: $ gcc -o sdmdos sdmdos.c $ sudo init S # ./sdmdos sendmsg: Invalid argument # ....Excellent.... I *love* running Linux on Sparc. -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 3767 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041214/b2d64381/smime.bin
Powered by blists - more mailing lists