1. 06 2月, 2008 3 次提交
  2. 02 2月, 2008 2 次提交
  3. 01 2月, 2008 1 次提交
  4. 30 1月, 2008 14 次提交
  5. 29 1月, 2008 1 次提交
  6. 26 1月, 2008 1 次提交
  7. 25 1月, 2008 11 次提交
  8. 22 1月, 2008 2 次提交
  9. 05 12月, 2007 3 次提交
  10. 30 11月, 2007 1 次提交
    • S
      file capabilities: don't prevent signaling setuid root programs · 8ec2328f
      Serge E. Hallyn 提交于
      An unprivileged process must be able to kill a setuid root program started
      by the same user.  This is legacy behavior needed for instance for xinit to
      kill X when the window manager exits.
      
      When an unprivileged user runs a setuid root program in !SECURE_NOROOT
      mode, fP, fI, and fE are set full on, so pP' and pE' are full on.  Then
      cap_task_kill() prevents the user from signaling the setuid root task.
      This is a change in behavior compared to when
      !CONFIG_SECURITY_FILE_CAPABILITIES.
      
      This patch introduces a special check into cap_task_kill() just to check
      whether a non-root user is signaling a setuid root program started by the
      same user.  If so, then signal is allowed.
      Signed-off-by: NSerge E. Hallyn <serue@us.ibm.com>
      Cc: Andrew Morgan <morgan@kernel.org>
      Cc: Stephen Smalley <sds@epoch.ncsc.mil>
      Cc: Chris Wright <chrisw@sous-sol.org>
      Cc: James Morris <jmorris@namei.org>
      Cc: Casey Schaufler <casey@schaufler-ca.com>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      8ec2328f
  11. 15 11月, 2007 1 次提交