lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1289149872.2478.155.camel@edumazet-laptop> Date: Sun, 07 Nov 2010 18:11:12 +0100 From: Eric Dumazet <eric.dumazet@...il.com> To: Dan Rosenberg <drosenberg@...curity.com> Cc: chas@....nrl.navy.mil, davem@...emloft.net, kuznet@....inr.ac.ru, pekkas@...core.fi, jmorris@...ei.org, yoshfuji@...ux-ipv6.org, kaber@...sh.net, remi.denis-courmont@...ia.com, netdev@...r.kernel.org, security@...nel.org, stable@...nel.org Subject: Re: [PATCH 3/9] Fix leaking of kernel heap addresses in net/ Le dimanche 07 novembre 2010 à 11:31 -0500, Dan Rosenberg a écrit : > Signed-off-by: Dan Rosenberg <drosenberg@...curity.com> > > diff -urp linux-2.6.37-rc1.orig/net/ipv4/af_inet.c linux-2.6.37-rc1/net/ipv4/af_inet.c > --- linux-2.6.37-rc1.orig/net/ipv4/af_inet.c 2010-11-01 07:54:12.000000000 -0400 > +++ linux-2.6.37-rc1/net/ipv4/af_inet.c 2010-11-07 10:31:41.000000000 -0500 > @@ -139,12 +139,13 @@ void inet_sock_destruct(struct sock *sk) > sk_mem_reclaim(sk); > > if (sk->sk_type == SOCK_STREAM && sk->sk_state != TCP_CLOSE) { > - pr_err("Attempt to release TCP socket in state %d %p\n", > - sk->sk_state, sk); > + pr_err("Attempt to release TCP socket in state %d %lu\n", > + sk->sk_state, sock_i_ino(sk)); > return; > } Why a non root user can read this debugging stuff, I ask. I suggest "dmesg" for them sends them a Windows XP system log, and /proc/cpuinfo pretends machine is a Z80, somewhat modified to have 65536 cores. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists