All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2 0/2] setgid hardening
@ 2017-01-28  2:49 ` Andy Lutomirski
  0 siblings, 0 replies; 22+ messages in thread
From: Andy Lutomirski @ 2017-01-28  2:49 UTC (permalink / raw)
  To: security
  Cc: Konstantin Khlebnikov, Alexander Viro, Kees Cook, Willy Tarreau,
	linux-mm, Andrew Morton, yalin wang, Linux Kernel Mailing List,
	Jan Kara, Linux FS Devel, Frank Filz, Andy Lutomirski

The kernel has some dangerous behavior involving the creation and
modification of setgid executables.  These issues aren't kernel
security bugs per se, but they have been used to turn various
filesystem permission oddities into reliably privilege escalation
exploits.

See http://www.halfdog.net/Security/2015/SetgidDirectoryPrivilegeEscalation/
for a nice writeup.

Let's fix them for real.

Changes from v1:
 - Fix uninitialized variable issue (Willy, Ben)
 - Also check current creds in should_remove_suid() (Ben)

Andy Lutomirski (2):
  fs: Check f_cred as well as of current's creds in should_remove_suid()
  fs: Harden against open(..., O_CREAT, 02777) in a setgid directory

 fs/inode.c         | 61 ++++++++++++++++++++++++++++++++++++++++++++++--------
 fs/internal.h      |  2 +-
 fs/ocfs2/file.c    |  4 ++--
 fs/open.c          |  2 +-
 include/linux/fs.h |  2 +-
 5 files changed, 57 insertions(+), 14 deletions(-)

-- 
2.9.3

^ permalink raw reply	[flat|nested] 22+ messages in thread

end of thread, other threads:[~2017-01-31 17:01 UTC | newest]

Thread overview: 22+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-01-28  2:49 [PATCH v2 0/2] setgid hardening Andy Lutomirski
2017-01-28  2:49 ` Andy Lutomirski
2017-01-28  2:49 ` [PATCH v2 1/2] fs: Check f_cred as well as of current's creds in should_remove_suid() Andy Lutomirski
2017-01-28  2:49   ` Andy Lutomirski
2017-01-31  3:50   ` Michael Kerrisk
2017-01-31  3:50     ` Michael Kerrisk
2017-01-31 11:43   ` Jeff Layton
2017-01-31 11:43     ` Jeff Layton
2017-01-31 11:43     ` Jeff Layton
2017-01-28  2:49 ` [PATCH v2 2/2] fs: Harden against open(..., O_CREAT, 02777) in a setgid directory Andy Lutomirski
2017-01-28  2:49   ` Andy Lutomirski
2017-01-31  3:50   ` Michael Kerrisk
2017-01-31  3:50     ` Michael Kerrisk
2017-01-31 11:43   ` Jeff Layton
2017-01-31 11:43     ` Jeff Layton
2017-01-31 11:43     ` Jeff Layton
2017-01-31 16:51     ` Andy Lutomirski
2017-01-31 16:51       ` Andy Lutomirski
2017-01-31  3:49 ` [PATCH v2 0/2] setgid hardening Michael Kerrisk
2017-01-31  3:49   ` Michael Kerrisk
2017-01-31  3:56   ` Andy Lutomirski
2017-01-31  3:56     ` Andy Lutomirski

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.