Block priority-inheriting futexes in sandboxed processes if possible
Categories
(Core :: Security: Process Sandboxing, enhancement, P3)
Tracking
()
People
(Reporter: jld, Unassigned)
References
Details
![]() |
||
Updated•7 years ago
|
Reporter | ||
Comment 1•6 years ago
|
||
More recently, some of the media people have discussed (ab)using priority-inheriting futexes to transfer realtime priority into a sandboxed process (because sandboxing needs to block DBus which prevents asking RTkit directly, and RTkit will grant realtime priority only to a thread in the process that actually made the request, and my understanding is that having realtime priority for threads handling audio data is empirically a noticeable improvement). So we might not want to do this; note that the kernel bug that inspired this bug was fixed many years ago.
Comment 2•4 years ago
|
||
There has been a new vulnerability exploiting PI futexes in the Linux kernel that allows non-root users to execute kernel-space code: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
Updated•3 years ago
|
Description
•