don't trust siginfo in rsyscall handler
authorRich Felker <dalias@aerifal.cx>
Sun, 3 Apr 2011 16:20:51 +0000 (12:20 -0400)
committerRich Felker <dalias@aerifal.cx>
Sun, 3 Apr 2011 16:20:51 +0000 (12:20 -0400)
for some inexplicable reason, linux allows the sender of realtime
signals to spoof its identity. permission checks for sending signals
should limit the impact to same-user processes, but just to be safe,
we avoid trusting the siginfo structure and instead simply examine the
program state to see if we're in the middle of a legitimate rsyscall.


No differences found