Показать сообщение отдельно
Старый 17.02.2015, 15:32   #30
SynQ
 
Регистрация: 11.07.2010
Сообщений: 953
Репутация: 352
По умолчанию

Цитата:
@grsecurity: 2010: exploits target restart_block field of thread_info / 2015: upstream Linux finally does something about it
Цитата:
all arches, signal: move restart_block to struct task_struct
If an attacker can cause a controlled kernel stack overflow, overwriting the restart block is a very juicy exploit target. This is because the restart_block is held in the same memory allocation as the kernel stack. Moving the restart block to struct task_struct prevents this exploit by making the restart_block harder to locate.
https://git.kernel.org/cgit/linux/ke...b572c2cdbb2a24
SynQ вне форума   Ответить с цитированием