Re: Potenitial security hole in the kernel

2001-05-29 Thread Jamie Lokier
Chris Wedgwood wrote: > By the way, the context stored on the stack is entirely a user > space context, however it does include some information from the > kernel that may be useful to user space, such as a page fault > address. > > I actually (ab)used this for userspace paging wi

Re: Potenitial security hole in the kernel

2001-05-28 Thread Jamie Lokier
Kurt Roeckx wrote: > You should never "return" from userspace to kernelspace. The > only way to go from user space to kernel space should be by using > a system call. That does actually happen on x86. The kernel puts a small code fragment called the "trampoline" on the user mode stack, which is

Re: Potenitial security hole in the kernel

2001-05-28 Thread Kurt Roeckx
On Tue, May 29, 2001 at 01:30:30AM +0200, Kurt Roeckx wrote: > You should never "return" from userspace to kernelspace. The > only way to go from user space to kernel space should be by using > a system call. If you were able to return to kernel space, it already means you're running as kernel i

Re: Potenitial security hole in the kernel

2001-05-28 Thread Kurt Roeckx
On Tue, May 29, 2001 at 12:12:56AM +0100, Russell King wrote: > On Mon, May 28, 2001 at 11:43:38PM +0200, Vadim Lebedev wrote: > > Please correct me if i'm wrong but it seems to me that i've stumbled on > > really BIG security hole in the signal handling code. > > I don't think there's problem, u

Re: Potenitial security hole in the kernel

2001-05-28 Thread Russell King
On Mon, May 28, 2001 at 11:43:38PM +0200, Vadim Lebedev wrote: > Please correct me if i'm wrong but it seems to me that i've stumbled on > really BIG security hole in the signal handling code. I don't think there's problem, unless I'm missing something. > The problem IMO is that the signal handl

Re: Potenitial security hole in the kernel

2001-05-28 Thread Kurt Roeckx
On Tue, May 29, 2001 at 12:30:03AM +0200, Vadim Lebedev wrote: > Kurt, > > Maybe i'm missing something but it seems that during execution of the signal > handler, user mode stack contains kernel mode context... > Hence the security hole It's rather complicated how things work. Both the user and

Re: Potenitial security hole in the kernel

2001-05-28 Thread Brett Frankenberger
> > Hi folks, > > Please correct me if i'm wrong but it seems to me that i've stumbled on > really BIG security hole in the signal handling code. > The problem IMO is that the signal handling code stores a processor context > on the user-mode stack frame which is active while > the signal handle

Re: Potenitial security hole in the kernel

2001-05-28 Thread Vadim Lebedev
<[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Tuesday, May 29, 2001 12:29 AM Subject: Re: Potenitial security hole in the kernel > On Mon, May 28, 2001 at 11:43:38PM +0200, Vadim Lebedev wrote: > > Hi folks, > > > > Please correct me if i'm wrong but it

Re: Potenitial security hole in the kernel

2001-05-28 Thread Vadim Lebedev
ev" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Tuesday, May 29, 2001 12:21 AM Subject: Re: Potenitial security hole in the kernel - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordom

Re: Potenitial security hole in the kernel

2001-05-28 Thread Kurt Roeckx
On Mon, May 28, 2001 at 11:43:38PM +0200, Vadim Lebedev wrote: > Hi folks, > > Please correct me if i'm wrong but it seems to me that i've stumbled on > really BIG security hole in the signal handling code. > The problem IMO is that the signal handling code stores a processor context > on the use

Re: Potenitial security hole in the kernel

2001-05-28 Thread Philip Blundell
>Suppose the signal handler modifies this context frame for example by >storing into the PC slot address of the panic routine >then when handler will exit panic will be called with obvious results. You can't execute panic() - or any other kernel function - in user mode. The application can write

Potenitial security hole in the kernel

2001-05-28 Thread Vadim Lebedev
Hi folks, Please correct me if i'm wrong but it seems to me that i've stumbled on really BIG security hole in the signal handling code. The problem IMO is that the signal handling code stores a processor context on the user-mode stack frame which is active while the signal handler is running. The