Re: [PATCH] sysctl: control functionality of /proc/pid/mem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Jan 21, 2012 at 1:03 AM, Ingo Molnar <mingo@xxxxxxx> wrote:
> * Kees Cook <keescook@xxxxxxxxxxxx> wrote:
>
>> @@ -702,6 +704,9 @@ static int mem_open(struct inode* inode, struct file* file)
>>       struct task_struct *task = get_proc_task(file->f_path.dentry->d_inode);
>>       struct mm_struct *mm;
>>
>> +     if (sysctl_proc_pid_mem < 1)
>> +             return -EACCES;
>
> This looks like an unprivileged user-space triggerable memory
> leak DoS. The task reference is already acquired at that point.

Ah, good catch; thanks. I'll respin.

-Kees

-- 
Kees Cook
ChromeOS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-doc" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]     [Linux Resources]

  Powered by Linux