Re: [Coverity] Untrusted user data in kernel

From: Bill Davidsen
Date: Fri Dec 17 2004 - 10:49:40 EST


James Morris wrote:
On Fri, 17 Dec 2004, Patrick McHardy wrote:


James Morris wrote:


This at least needs CAP_NET_ADMIN.


It is already checked in do_ip6t_set_ctl(). Otherwise anyone could
replace iptables rules :)


That's what I meant, you need the capability to do anything bad :-)

Are you saying that processes with capability don't make mistakes? This isn't a bug related to untrusted users doing privileged operations, it's a case of using unchecked user data.


--
-bill davidsen (davidsen@xxxxxxx)
"The secret to procrastination is to put things off until the
last possible moment - but no longer" -me
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/