1. 09 8月, 2016 3 次提交
  2. 21 7月, 2016 1 次提交
  3. 28 6月, 2016 2 次提交
  4. 25 6月, 2016 1 次提交
  5. 24 6月, 2016 1 次提交
    • A
      fs: Treat foreign mounts as nosuid · 380cf5ba
      Andy Lutomirski 提交于
      If a process gets access to a mount from a different user
      namespace, that process should not be able to take advantage of
      setuid files or selinux entrypoints from that filesystem.  Prevent
      this by treating mounts from other mount namespaces and those not
      owned by current_user_ns() or an ancestor as nosuid.
      
      This will make it safer to allow more complex filesystems to be
      mounted in non-root user namespaces.
      
      This does not remove the need for MNT_LOCK_NOSUID.  The setuid,
      setgid, and file capability bits can no longer be abused if code in
      a user namespace were to clear nosuid on an untrusted filesystem,
      but this patch, by itself, is insufficient to protect the system
      from abuse of files that, when execed, would increase MAC privilege.
      
      As a more concrete explanation, any task that can manipulate a
      vfsmount associated with a given user namespace already has
      capabilities in that namespace and all of its descendents.  If they
      can cause a malicious setuid, setgid, or file-caps executable to
      appear in that mount, then that executable will only allow them to
      elevate privileges in exactly the set of namespaces in which they
      are already privileges.
      
      On the other hand, if they can cause a malicious executable to
      appear with a dangerous MAC label, running it could change the
      caller's security context in a way that should not have been
      possible, even inside the namespace in which the task is confined.
      
      As a hardening measure, this would have made CVE-2014-5207 much
      more difficult to exploit.
      Signed-off-by: NAndy Lutomirski <luto@amacapital.net>
      Signed-off-by: NSeth Forshee <seth.forshee@canonical.com>
      Acked-by: NJames Morris <james.l.morris@oracle.com>
      Acked-by: NSerge Hallyn <serge.hallyn@canonical.com>
      Signed-off-by: NEric W. Biederman <ebiederm@xmission.com>
      380cf5ba
  6. 27 4月, 2016 2 次提交
  7. 20 4月, 2016 3 次提交
  8. 11 4月, 2016 2 次提交
  9. 06 4月, 2016 4 次提交
  10. 28 3月, 2016 1 次提交
  11. 20 2月, 2016 1 次提交
  12. 28 1月, 2016 1 次提交
  13. 09 1月, 2016 1 次提交
  14. 25 12月, 2015 7 次提交
  15. 09 11月, 2015 1 次提交
  16. 06 11月, 2015 1 次提交
  17. 22 10月, 2015 5 次提交
  18. 17 10月, 2015 1 次提交
  19. 11 10月, 2015 1 次提交
  20. 19 9月, 2015 1 次提交