summaryrefslogtreecommitdiff
path: root/Documentation/telephony
diff options
context:
space:
mode:
authorJulien Tinnes <jln@google.com>2011-03-18 15:05:21 -0700
committerPaul Gortmaker <paul.gortmaker@windriver.com>2011-04-17 16:16:17 -0400
commit9eab773eb3eda5d8336a8f0ac68c5e1faa5f88d5 (patch)
tree5e52a82110c71363710603b85b1e96dd240c7a5e /Documentation/telephony
parentc95610ef5cf44dcef45434ca6de0832aa9b02708 (diff)
Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code
commit da48524eb20662618854bb3df2db01fc65f3070c upstream. Userland should be able to trust the pid and uid of the sender of a signal if the si_code is SI_TKILL. Unfortunately, the kernel has historically allowed sigqueueinfo() to send any si_code at all (as long as it was negative - to distinguish it from kernel-generated signals like SIGILL etc), so it could spoof a SI_TKILL with incorrect siginfo values. Happily, it looks like glibc has always set si_code to the appropriate SI_QUEUE, so there are probably no actual user code that ever uses anything but the appropriate SI_QUEUE flag. So just tighten the check for si_code (we used to allow any negative value), and add a (one-time) warning in case there are binaries out there that might depend on using other si_code values. Signed-off-by: Julien Tinnes <jln@google.com> Acked-by: Oleg Nesterov <oleg@redhat.com> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
Diffstat (limited to 'Documentation/telephony')
0 files changed, 0 insertions, 0 deletions