]> git.ipfire.org Git - thirdparty/man-pages.git/commit
seccomp_unotify.2: EXAMPLE: ensure path read() by the supervisor is null-terminated
authorMichael Kerrisk <mtk.manpages@gmail.com>
Fri, 16 Oct 2020 09:02:08 +0000 (11:02 +0200)
committerMichael Kerrisk <mtk.manpages@gmail.com>
Wed, 9 Jun 2021 22:40:17 +0000 (10:40 +1200)
commitbf892a6527d070bbe3dfd0853a3a0df2150174c4
treec15db5dcaa2c1e8fd99adc03aade42f5f702973b
parente4db7ae69d1abac8af28aedbb06ca429b29e54e2
seccomp_unotify.2: EXAMPLE: ensure path read() by the supervisor is null-terminated

From a conversation with Jann Horn:

    >> We should probably make sure here that the value we read is actually
    >> NUL-terminated?
    >
    > So, I was curious about that point also. But, (why) are we not
    > guaranteed that it will be NUL-terminated?

    Because it's random memory filled by another process, which we don't
    necessarily trust. While seccomp notifiers aren't usable for applying
    *extra* security restrictions, the supervisor will still often be more
    privileged than the supervised process.

Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
man2/seccomp_unotify.2