Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Nov 2010 12:49:22 +0200
From:      Ivan Klymenko <fidaj@ukr.net>
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: Simple kernel attack using socketpair.
Message-ID:  <20101126124922.3947bab4@ukr.net>
In-Reply-To: <20101126122639.4fd47cba@ukr.net>
References:  <20101126122639.4fd47cba@ukr.net>

next in thread | previous in thread | raw e-mail | index | archive | help
=D0=92 Fri, 26 Nov 2010 12:26:39 +0200
Ivan Klymenko <fidaj@ukr.net> =D0=BF=D0=B8=D1=88=D0=B5=D1=82:

> Hello!
> Rumor has it that this vulnerability applies to FreeBSD too, with the
> replacement SOCK_SEQPACKET on SOCK_DGRAM...
and add:

#include <sys/mount.h>
#include <sys/wait.h>
#include <errno.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>

>=20
> http://lkml.org/lkml/2010/11/25/8
>=20
> What do you think about this?
>=20
> Thank you!



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20101126124922.3947bab4>