Re: [PATCH 2/2] taskstats: restrict access to user

From: Vasiliy Kulikov
Date: Thu Jul 07 2011 - 04:57:46 EST


On Mon, Jul 04, 2011 at 21:45 +0400, Vasiliy Kulikov wrote:
> The already known danger is these io fields.

Two more things:

1) unblocking netlink socket on task exit is a rather useful help to win
different races. E.g. if the vulnerable program has the code -

wait(NULL);
do_smth_racy();

- then the attacker's task listening for the taskstats event will be
effectively woken up just before the racy code. It might greatly
increase the chanses to win the race => to exploit the bug.
(The same defect exists in inotify.)


2) taskstats gives the task information at the precisely specific moment
- task death. So, the attacker shouldn't guess whether some event
occured or not. The formula of gotten information is _exactly_ task
activity during the life. On the contrary, getting the same information
from procfs files might result in some inaccuracy because of measuring
time inaccuracy (scheduler's variability, different disks' load, etc.).

Of cource, (2) makes sense only if some sensible information is still
available through taskstats.


Thanks,

--
Vasiliy Kulikov
http://www.openwall.com - bringing security into open computing environments
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/