Re: [Coverity] Untrusted user data in kernel
From: Bill Davidsen
Date: Fri Dec 17 2004 - 10:49:40 EST
James Morris wrote:
On Fri, 17 Dec 2004, Patrick McHardy wrote:
James Morris wrote:
This at least needs CAP_NET_ADMIN.
It is already checked in do_ip6t_set_ctl(). Otherwise anyone could
replace iptables rules :)
That's what I meant, you need the capability to do anything bad :-)
Are you saying that processes with capability don't make mistakes? This
isn't a bug related to untrusted users doing privileged operations, it's
a case of using unchecked user data.
--
-bill davidsen (davidsen@xxxxxxx)
"The secret to procrastination is to put things off until the
last possible moment - but no longer" -me
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/