Updated the XNU code browser to xnu-4903.221.2. https://fergofrog.com/code/cbowser/xnu/ …
-
-
Finally mptcp_check_subflows_and_add, either passes a fixed length dst struct, or one from mpte->mpte_dst, which is set from https://fergofrog.com/code/cbowser/xnu/bsd/netinet/mptcp_usrreq.c.html#353 …, which is our dear friend from before, mptcp_usr_connectx, which checks sa_len.
Prikaži ovu nit -
Unless there's a driver that happily passes sockaddr's from userland into mptcp straight through mptcp_connectx, rather than mptcp_usr_connectx, this is not an exploitable bug. Definitely doesn't require additional checks to be added, or a CVE to be assigned.
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
Tweet je nedostupan.
-
You're referring to this "flow" https://twitter.com/userlandkernel/status/1076595984732471296 …? Seems to be from https://brightiup.me/QuartzCore/FunctionIntOverFlow.c … a very cool, yet unrelated, exploit for CVE-2018-4415.
Tweet je nedostupan. - Još 2 druga odgovora
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.