Re: Potenitial security hole in the kernel

Philip Blundell (philb@gnu.org)
Mon, 28 May 2001 23:21:49 +0100


--==_Exmh_-1306962384P
Content-Type: text/plain; charset=us-ascii

>Suppose the signal handler modifies this context frame for example by
>storing into the PC slot address of the panic routine
>then when handler will exit panic will be called with obvious results.

You can't execute panic() - or any other kernel function - in user mode.
The application can write what it likes into its sigcontext, and the worst
that will hapenn is that it will crash itself.

p.

--==_Exmh_-1306962384P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Content-Type: text/plain; charset=us-ascii

>Suppose the signal handler modifies this context frame for example by
>storing into the PC slot address of the panic routine
>then when handler will exit panic will be called with obvious results.

You can't execute panic() - or any other kernel function - in user mode.
The application can write what it likes into its sigcontext, and the worst
that will hapenn is that it will crash itself.

p.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Exmh version 2.1.1 10/15/1999 (debian)

iD8DBQE7Es99VTLPJe9CT30RAmfxAJ0Sjtu31TsBYYQpnY0uGyfkW+1vgQCeLDq+
VHXbmqAhFJYxuPHyLSaFlJA=
=+Lbc
-----END PGP SIGNATURE-----

--==_Exmh_-1306962384P--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/