|
Message-ID: <CACYkhxipofcN=sdyjAVY1LmFcts3s9KzG4dABHX0DDBi1zCkEw@mail.gmail.com> Date: Wed, 15 Apr 2015 10:29:16 +1000 From: Michael Samuel <mik@...net.net> To: oss-security@...ts.openwall.com Subject: Re: Re: Problems in automatic crash analysis frameworks On 15 April 2015 at 07:08, Tavis Ormandy <taviso@...gle.com> wrote: >>>> import socket >>>> socket.socket(socket.AF_UNIX, socket.SOCK_STREAM).bind('test\ntest') >>>> sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM) >>>> sock.bind('/tmp/foo\nbar') >>>> sock.listen(1) > > $ grep -A1 foo /proc/net/unix > 0000000000000000: 00000002 00000000 00010000 0001 01 4772228 /tmp/foo > bar This is a Linux kernel flaw/bug right? It's a machine-readable newline-delimited /proc file, so it needs to escape newlines if they're valid data. Regards, Michael
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.