|
Message-ID: <49E6DC10.3000302@redhat.com> Date: Thu, 16 Apr 2009 15:19:44 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: CVE request: kernel: 'kill sig -1' must only apply to caller's PID namespace I came across this while reviewing some older upstream patches. Apparently, it was possible to run kill <sig> -1 to kill processes in all PID namespaces, and break the isolation of namespaces. The expected behaviour for this is to only kill processes in its own hierarchy. The fix uses task_pid_vnr() to check if the process is outside of the caller's namespace before killing. PID namespaces was merged in 2.6.24. References: http://lwn.net/Articles/259217/ https://bugzilla.redhat.com/show_bug.cgi?id=496031 http://git.kernel.org/linus/d25141a818383b3c3b09f065698c544a7a0ec6e7 Thanks, Eugene -- Eugene Teo / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.