lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4ef5fec60512231057v2de3cb45j937d2ec188cd7df6@mail.gmail.com> Date: Fri Dec 23 18:58:06 2005 From: coderman at gmail.com (coderman) Subject: linux procfs vulnerablity On 12/23/05, Karl Janmar <karl@...piafoundation.org> wrote: > ... > I have found one flaw in Linux procfs code that make the kernel disclose memory. i'd love to see you exploit this! rly! > fs/proc/proc_misc.c:74 > ... > if (len <= off+count) *eof = 1; > ... > off is a off_t and count is a int. what arch? on intel assign a s32 to int? the sky is falling...