Re: [PATCH] signal: stop info leak via the tkill and the tgkill syscalls

2013-04-20 Thread Eric W. Biederman
"Serge E. Hallyn" writes: > > Sorry, not sure if this is applied yet, > > Acked-by: Serge Hallyn I am pretty certain I saw Andrew apply this one and I have already seen the stable back from gregkh go past. Eric -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the b

Re: [PATCH] signal: stop info leak via the tkill and the tgkill syscalls

2013-04-20 Thread Serge E. Hallyn
Quoting Kees Cook (keesc...@chromium.org): > From: Emese Revfy > > This fixes a kernel memory contents leak via the tkill and tgkill syscalls > for compat processes. > > This is visible in the siginfo_t->_sifields._rt.si_sigval.sival_ptr field > when handling signals delivered from tkill. > > T

[PATCH] signal: stop info leak via the tkill and the tgkill syscalls

2013-04-17 Thread Kees Cook
From: Emese Revfy This fixes a kernel memory contents leak via the tkill and tgkill syscalls for compat processes. This is visible in the siginfo_t->_sifields._rt.si_sigval.sival_ptr field when handling signals delivered from tkill. The place of the infoleak: int copy_siginfo_to_user32(compat_