Hi,
I wonder whether there is any exploitation to hijack read-only
mapping, only just PROT_READ without PROT_EXEC, file mapping by
controlling the content of this file.
Maybe I can't control where it maps to, but I can control the
content of file to control what is mapped into address space.
- mudongliang
--
To unsubscribe from this list: send the line "unsubscribe
linux-security-module" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html