lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 14 May 2016 15:16:55 -0400 (EDT) From: David Miller <davem@...emloft.net> To: torvalds@...ux-foundation.org Cc: eric.dumazet@...il.com, w@....eu, netdev@...r.kernel.org Subject: Re: [PATCH] nf_conntrack: avoid kernel pointer value leak in slab name From: Linus Torvalds <torvalds@...ux-foundation.org> Date: Sat, 14 May 2016 11:24:08 -0700 (PDT) > > From: Linus Torvalds <torvalds@...ux-foundation.org> > Date: Sat, 14 May 2016 11:11:44 -0700 > Subject: [PATCH] nf_conntrack: avoid kernel pointer value leak in slab name > > The slab name ends up being visible in the directory structure under > /sys, and even if you don't have access rights to the file you can see > the filenames. > > Just use a 64-bit counter instead of the pointer to the 'net' structure > to generate a unique name. > > This code will go away in 4.7 when the conntrack code moves to a single > kmemcache, but this is the backportable simple solution to avoiding > leaking kernel pointers to user space. > > Signed-off-by: Linus Torvalds <torvalds@...ux-foundation.org> > Acked-by: Eric Dumazet <eric.dumazet@...il.com> > Cc: stable@...r.kernel.org Applied, thanks.
Powered by blists - more mailing lists