Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Linux kernel: memory reading via socket filter

November 2010 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/

SYNTHESIS OF THE VULNERABILITY

A local attacker can use a socket filter, in order to read bytes
coming from the kernel memory.

Severity: 1/4

Creation date: 10/11/2010

DESCRIPTION OF THE VULNERABILITY

A socket filter indicates BPF rules that the kernel has to use to
filter data to be returned to the user.

However, the kernel does not initialize the area storing
information on network data. Values previously stored at this
address are thus returned to the user.

A local attacker can therefore use a socket filter, in order to
read bytes coming from the kernel memory.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/Linux-kernel-memory-reading-via-socket-filter-10119


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts