http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6434
On 2/4/08, Oliver Pinter <[EMAIL PROTECTED]> wrote: > mainline: ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5 > > --->8--- > commit ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5 > Author: Eric Paris <[EMAIL PROTECTED]> > Date: Tue Dec 4 23:45:31 2007 -0800 > > VM/Security: add security hook to do_brk > > Given a specifically crafted binary do_brk() can be used to get low > pages > available in userspace virtual memory and can thus be used to circumvent > the mmap_min_addr low memory protection. Add security checks in > do_brk(). > > Signed-off-by: Eric Paris <[EMAIL PROTECTED]> > Acked-by: Alan Cox <[EMAIL PROTECTED]> > Cc: Stephen Smalley <[EMAIL PROTECTED]> > Cc: James Morris <[EMAIL PROTECTED]> > Cc: Chris Wright <[EMAIL PROTECTED]> > Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> > Signed-off-by: Linus Torvalds <[EMAIL PROTECTED]> > > diff --git a/mm/mmap.c b/mm/mmap.c > index facc1a7..acfc13f 100644 > --- a/mm/mmap.c > +++ b/mm/mmap.c > @@ -1934,6 +1934,10 @@ unsigned long do_brk(unsigned long addr, unsigned > long le > if (is_hugepage_only_range(mm, addr, len)) > return -EINVAL; > > + error = security_file_mmap(0, 0, 0, 0, addr, 1); > + if (error) > + return error; > + > flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags; > > error = arch_mmap_check(addr, len, flags); > ---8<--- > -- > Thanks, > Oliver > -- Thanks, Oliver -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/