From owner-freebsd-hackers@FreeBSD.ORG Fri Nov 26 10:49:24 2010 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id CC1D4106566C for ; Fri, 26 Nov 2010 10:49:24 +0000 (UTC) (envelope-from fidaj@ukr.net) Received: from fsm1.ukr.net (fsm1.ukr.net [195.214.192.23]) by mx1.freebsd.org (Postfix) with ESMTP id 89C538FC08 for ; Fri, 26 Nov 2010 10:49:24 +0000 (UTC) Received: from 231-73-132-95.pool.ukrtel.net ([95.132.73.231] helo=localhost) by fsm1.ukr.net with esmtps ID 1PLvrn-000Ixj-9O for freebsd-hackers@freebsd.org; Fri, 26 Nov 2010 12:49:23 +0200 Date: Fri, 26 Nov 2010 12:49:22 +0200 From: Ivan Klymenko Cc: freebsd-hackers@freebsd.org Message-ID: <20101126124922.3947bab4@ukr.net> In-Reply-To: <20101126122639.4fd47cba@ukr.net> References: <20101126122639.4fd47cba@ukr.net> X-Mailer: Claws Mail 3.7.6 (GTK+ 2.20.1; amd64-portbld-freebsd9.0) Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Subject: Re: Simple kernel attack using socketpair. X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Nov 2010 10:49:24 -0000 =D0=92 Fri, 26 Nov 2010 12:26:39 +0200 Ivan Klymenko =D0=BF=D0=B8=D1=88=D0=B5=D1=82: > Hello! > Rumor has it that this vulnerability applies to FreeBSD too, with the > replacement SOCK_SEQPACKET on SOCK_DGRAM... and add: #include #include #include #include #include #include #include #include >=20 > http://lkml.org/lkml/2010/11/25/8 >=20 > What do you think about this? >=20 > Thank you!