User: Password:
|
|
Subscribe / Log in / New account

Checkpoint/restore and signals

Checkpoint/restore and signals

Posted Jan 11, 2013 8:01 UTC (Fri) by kugel (subscriber, #70540)
Parent article: Checkpoint/restore and signals

(It seems safe to allow a process to spoof as the kernel when sending signals to itself.)
Except when used to exploit (shared) libraries that are linked into the current process.


(Log in to post comments)

Checkpoint/restore and signals

Posted Jan 11, 2013 16:10 UTC (Fri) by nybble41 (subscriber, #55106) [Link]

> Except when used to exploit (shared) libraries that are linked into the current process.

I don't think that can realistically be considered an issue. Libraries are already entirely at the mercy of the process they're linked into, sharing RAM, signals, file descriptors, stack space, etc. There is no point in defining security boundaries between code modules which have been linked into the same executable and run in the same address space.


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds