[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190401112219.GA22763@bombadil.infradead.org>
Date: Mon, 1 Apr 2019 04:22:19 -0700
From: Matthew Wilcox <willy@...radead.org>
To: Johannes Thumshirn <jthumshirn@...e.de>
Cc: Linux Kernel Mailinglist <linux-kernel@...r.kernel.org>,
Linux FSDEVEL Mailinglist <linux-fsdevel@...r.kernel.org>
Subject: Re: [PATCH] fs/open: Fix most outstanding security bugs
On Mon, Apr 01, 2019 at 11:01:13AM +0200, Johannes Thumshirn wrote:
> Over the last 20 years, the Linux kernel has accumulated hundreds if not
> thousands of security vulnerabilities.
>
> One common pattern in most of these security related reports is processes
> called "syzkaller", "trinity" or "syz-executor" opening files and then
> abuse kernel interfaces causing kernel crashes or even worse threats using
> memory overwrites or by exploiting race conditions.
>
> Hunting down these bugs has become time consuming and very expensive, so
> I've decided to put an end to it.
>
> If one of the above mentioned processes tries opening a file, return -EPERM
> indicating this process does not have the permission to open files on Linux
> anymore.
>
> Signed-off-by: Johannes Thumshirn <jthumshirn@...e.de>
I think you should have credited Cisco for the idea.
https://twitter.com/RedTeamPT/status/1110843396657238016
Powered by blists - more mailing lists