Leaking path for set_task_comm
Alan Cox
gnomes at lxorguk.ukuu.org.uk
Wed Sep 26 22:39:03 UTC 2018
> Trying to depend on task name for anything security sensitive is at
> _really_ bad idea, so it seems unlikely that a LSM would want to
> protect the process name. (And if they did, the first thing I would
> ask is "Why? What are you trying to do? Do you realize how many
> *other* ways the process name can be spoofed or otherwise controlled
> by a potentially malicious user?")
Two processes that should not be able to otherwise communicate can keep
changing their name to a chunk of data, waiting for an ack flag name
change back.
Alan
More information about the Linux-security-module-archive
mailing list