All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 0/2] setgid hardening
@ 2017-01-25 21:06 ` Andy Lutomirski
  0 siblings, 0 replies; 24+ messages in thread
From: Andy Lutomirski @ 2017-01-25 21:06 UTC (permalink / raw)
  To: security
  Cc: Konstantin Khlebnikov, Alexander Viro, Kees Cook, Willy Tarreau,
	linux-mm, Andrew Morton, yalin wang, Linux Kernel Mailing List,
	Jan Kara, Linux FS Devel, Andy Lutomirski

The kernel has some dangerous behavior involving the creation and
modification of setgid executables.  These issues aren't kernel
security bugs per se, but they have been used to turn various
filesystem permission oddities into reliably privilege escalation
exploits.

See http://www.halfdog.net/Security/2015/SetgidDirectoryPrivilegeEscalation/
for a nice writeup.

Let's fix them for real.

Andy Lutomirski (2):
  fs: Check f_cred instead of current's creds in should_remove_suid()
  fs: Harden against open(..., O_CREAT, 02777) in a setgid directory

 fs/inode.c         | 37 ++++++++++++++++++++++++++++++-------
 fs/internal.h      |  2 +-
 fs/ocfs2/file.c    |  4 ++--
 fs/open.c          |  2 +-
 include/linux/fs.h |  2 +-
 5 files changed, 35 insertions(+), 12 deletions(-)

-- 
2.9.3

^ permalink raw reply	[flat|nested] 24+ messages in thread

end of thread, other threads:[~2017-01-26  0:12 UTC | newest]

Thread overview: 24+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-01-25 21:06 [PATCH 0/2] setgid hardening Andy Lutomirski
2017-01-25 21:06 ` Andy Lutomirski
2017-01-25 21:06 ` [PATCH 1/2] fs: Check f_cred instead of current's creds in should_remove_suid() Andy Lutomirski
2017-01-25 21:06   ` Andy Lutomirski
2017-01-25 21:43   ` Ben Hutchings
2017-01-25 21:48     ` Andy Lutomirski
2017-01-25 21:48       ` Andy Lutomirski
2017-01-25 23:15       ` Frank Filz
2017-01-25 23:15         ` Frank Filz
2017-01-25 23:15         ` Frank Filz
2017-01-26  0:12     ` Kees Cook
2017-01-26  0:12       ` Kees Cook
2017-01-25 21:06 ` [PATCH 2/2] fs: Harden against open(..., O_CREAT, 02777) in a setgid directory Andy Lutomirski
2017-01-25 21:06   ` Andy Lutomirski
2017-01-25 21:31   ` Ben Hutchings
2017-01-25 21:44     ` Andy Lutomirski
2017-01-25 21:44       ` Andy Lutomirski
2017-01-25 23:17   ` Frank Filz
2017-01-25 23:17     ` Frank Filz
2017-01-25 23:17     ` Frank Filz
2017-01-25 23:50   ` Willy Tarreau
2017-01-25 23:50     ` Willy Tarreau
2017-01-25 23:59 ` [PATCH 0/2] setgid hardening Willy Tarreau
2017-01-25 23:59   ` Willy Tarreau

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.