Export to GitHub

seccompsandbox - issue #6

Vulnerability in process_sigaction()


Posted on Sep 27, 2010 by Happy Hippo

Following on from http://codereview.chromium.org/3380018/show and http://codereview.chromium.org/3414016/show, for the sake of completeness, I am filing a bug on this.

There is a vulnerability in process_sigaction() in sigaction.cc, which does the following:

SecureMem::sendSystemCall(threadFdPub, false, -1, mem, sigaction_req.sysnum, sigaction_req.signum, sigaction_req.action, sigaction_req.old_action, sigaction_req.sigsetsize);

It receives the syscall number sigaction_req.sysnum in a message, but it passes it on to the trusted thread for execution without checking it.

This means an attacker can execute any syscall with 4 arguments. The only constraint is that the first argument cannot be 11.

Comment #1

Posted on Nov 11, 2010 by Happy Hippo

Fixed in r125.

Status: Fixed

Labels:
Type-Defect Priority-Medium