Date: Fri, 26 Nov 2010 12:49:22 +0200 From: Ivan Klymenko <fidaj@ukr.net> Cc: freebsd-hackers@freebsd.org Subject: Re: Simple kernel attack using socketpair. Message-ID: <20101126124922.3947bab4@ukr.net> In-Reply-To: <20101126122639.4fd47cba@ukr.net> References: <20101126122639.4fd47cba@ukr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
=D0=92 Fri, 26 Nov 2010 12:26:39 +0200 Ivan Klymenko <fidaj@ukr.net> =D0=BF=D0=B8=D1=88=D0=B5=D1=82: > Hello! > Rumor has it that this vulnerability applies to FreeBSD too, with the > replacement SOCK_SEQPACKET on SOCK_DGRAM... and add: #include <sys/mount.h> #include <sys/wait.h> #include <errno.h> #include <fcntl.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> >=20 > http://lkml.org/lkml/2010/11/25/8 >=20 > What do you think about this? >=20 > Thank you!
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20101126124922.3947bab4>