New issue
Advanced search Search tips

Issue 756478 link

Starred by 1 user

Issue metadata

Status: Archived
Owner:
Closed: Aug 2017
Cc:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 3
Type: Task



Sign in to add a comment

Security: Do we enable the bpf() syscall on Chrome OS?

Project Member Reported by jorgelo@chromium.org, Aug 17 2017

Issue description

As per the title. We're analyzing an internally-discovered bug and one exploitation mechanism uses the bpf() syscall. The provided PoC doesn't work, but just want to make sure.
 

Comment 1 by groeck@chromium.org, Aug 17 2017

Labels: -Type-Bug-Security Pri-3 Type-Task
Status: Fixed (was: Assigned)
$ git describe
v4.4.79-11440-g01906fee2945

$ git grep CONFIG_BPF | grep chromeos
chromeos/config/arm64/common.config:# CONFIG_BPF_JIT is not set
chromeos/config/armel/common.config:# CONFIG_BPF_JIT is not set
chromeos/config/base.config:CONFIG_BPF=y
chromeos/config/base.config:# CONFIG_BPF_SYSCALL is not set
chromeos/config/x86_64/common.config:# CONFIG_BPF_JIT is not set

Project Member

Comment 2 by sheriffbot@chromium.org, Aug 18 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 3 by sheriffbot@chromium.org, Nov 24 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Comment 4 by dchan@chromium.org, Jan 22 2018

Status: Archived (was: Fixed)

Sign in to add a comment