Hi,
    I wonder whether there is any exploitation to hijack read-only
mapping, only just PROT_READ without PROT_EXEC,  file mapping by
controlling the content of this file.
    Maybe I can't control where it maps to, but I can control the
content of file to control what is mapped into address space.

    - mudongliang
--
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to