Vigil@nce - Linux kernel: memory reading via socket filter
November 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
A local attacker can use a socket filter, in order to read bytes
coming from the kernel memory.
Severity: 1/4
Creation date: 10/11/2010
DESCRIPTION OF THE VULNERABILITY
A socket filter indicates BPF rules that the kernel has to use to
filter data to be returned to the user.
However, the kernel does not initialize the area storing
information on network data. Values previously stored at this
address are thus returned to the user.
A local attacker can therefore use a socket filter, in order to
read bytes coming from the kernel memory.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-memory-reading-via-socket-filter-10119