Re: Potenitial security hole in the kernel

From: Philip Blundell (philb@gnu.org)
Date: Mon May 28 2001 - 17:21:49 EST


>Suppose the signal handler modifies this context frame for example by
>storing into the PC slot address of the panic routine
>then when handler will exit panic will be called with obvious results.

You can't execute panic() - or any other kernel function - in user mode.
The application can write what it likes into its sigcontext, and the worst
that will hapenn is that it will crash itself.

p.



-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Thu May 31 2001 - 21:00:37 EST