1. 13 7月, 2006 3 次提交
    • A
      [PATCH] lockdep: annotate the sysfs i_mutex to be a separate class · 232ba9db
      Arjan van de Ven 提交于
      sysfs has a different i_mutex lock order behavior for i_mutex than the
      other filesystems; sysfs i_mutex is called in many places with subsystem
      locks held.  At the same time, many of the VFS locking rules do not apply
      to sysfs at all (cross directory rename for example).  To untangle this
      mess (which gives false positives in lockdep), we're giving sysfs inodes
      their own class for i_mutex.
      Signed-off-by: NArjan van de Ven <arjan@linux.intel.com>
      Cc: Ingo Molnar <mingo@elte.hu>
      Cc: Greg KH <greg@kroah.com>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      232ba9db
    • K
      [PATCH] fix fdset leakage · d579091b
      Kirill Korotaev 提交于
      When found, it is obvious.  nfds calculated when allocating fdsets is
      rewritten by calculation of size of fdtable, and when we are unlucky, we
      try to free fdsets of wrong size.
      
      Found due to OpenVZ resource management (User Beancounters).
      Signed-off-by: NAlexey Kuznetsov <kuznet@ms2.inr.ac.ru>
      Signed-off-by: NKirill Korotaev <dev@openvz.org>
      Cc: <stable@kernel.org>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      d579091b
    • M
      [PATCH] Fix prctl privilege escalation and suid_dumpable (CVE-2006-2451) · abf75a50
      Marcel Holtmann 提交于
      Based on a patch from Ernie Petrides
      
      During security research, Red Hat discovered a behavioral flaw in core
      dump handling. A local user could create a program that would cause a
      core file to be dumped into a directory they would not normally have
      permissions to write to. This could lead to a denial of service (disk
      consumption), or allow the local user to gain root privileges.
      
      The prctl() system call should never allow to set "dumpable" to the
      value 2. Especially not for non-privileged users.
      
      This can be split into three cases:
      
        1) running as root -- then core dumps will already be done as root,
           and so prctl(PR_SET_DUMPABLE, 2) is not useful
      
        2) running as non-root w/setuid-to-root -- this is the debatable case
      
        3) running as non-root w/setuid-to-non-root -- then you definitely
           do NOT want "dumpable" to get set to 2 because you have the
           privilege escalation vulnerability
      
      With case #2, the only potential usefulness is for a program that has
      designed to run with higher privilege (than the user invoking it) that
      wants to be able to create root-owned root-validated core dumps. This
      might be useful as a debugging aid, but would only be safe if the program
      had done a chdir() to a safe directory.
      
      There is no benefit to a production setuid-to-root utility, because it
      shouldn't be dumping core in the first place. If this is true, then the
      same debugging aid could also be accomplished with the "suid_dumpable"
      sysctl.
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      abf75a50
  2. 12 7月, 2006 11 次提交
  3. 11 7月, 2006 26 次提交