Am 08.05.2016 um 17:40 schrieb Kangjie Lu:
> 
> 
> On Sun, May 8, 2016 at 8:58 AM, Richard Weinberger 
> <richard.weinber...@gmail.com <mailto:richard.weinber...@gmail.com>> wrote:
> 
>     On Tue, May 3, 2016 at 10:34 PM, Kangjie Lu <kangji...@gmail.com 
> <mailto:kangji...@gmail.com>> wrote:
>     > The stack object “si” has a total size of 128 bytes; however, only
>     > 16 bytes are initialized. The remaining uninitialized bytes are
>     > sent to userland via send_signal.
> 
>     How did you find all these leaks?
>     Since you sent more than one patch I guess you used some tool, which one?
> 
> 
> Yes. Since there are *so many* infoleak vulnerabilities in the kernel, we are 
> writing a
> static checker to find them.  We plan to release it once it is done, so 
> people can use
> it to find more bugs in kernel or even other user space programs.

How does your tool work?
I'd guess it tries to find uninitialized structs passed into copy_to_user().

Thanks,
//richard

Reply via email to