Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263014AbUDLSkL (ORCPT ); Mon, 12 Apr 2004 14:40:11 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263007AbUDLSkL (ORCPT ); Mon, 12 Apr 2004 14:40:11 -0400 Received: from fw.osdl.org ([65.172.181.6]:25287 "EHLO mail.osdl.org") by vger.kernel.org with ESMTP id S263014AbUDLSkH (ORCPT ); Mon, 12 Apr 2004 14:40:07 -0400 Date: Mon, 12 Apr 2004 11:40:03 -0700 From: Chris Wright To: Olaf Dietsche Cc: Andy Lutomirski , Kernel Mailing List , akpm@osdl.org, torvalds@osdl.org Subject: Re: [PATCH, local root on 2.4, 2.6?] compute_creds race Message-ID: <20040412114003.M22989@build.pdx.osdl.net> References: <4076F02E.1000809@myrealbox.com> <87brm015uj.fsf@goat.bogus.local> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <87brm015uj.fsf@goat.bogus.local>; from olaf+list.linux-kernel@olafdietsche.de on Sat, Apr 10, 2004 at 12:32:04PM +0200 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 605 Lines: 20 * Olaf Dietsche (olaf+list.linux-kernel@olafdietsche.de) wrote: > In linux 2.4.25 there is no LSM and thus no vulnerability. And, more specifically, the locking is sufficient. > linux-2.4.25/fs/exec.c: > lock_kernel(); > if (must_not_trace_exec(current) ... thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/