From: Kees Cook <kees.cook@canonical.com>
To: Andi Kleen <andi@firstfloor.org>
Cc: linux-security-module@vger.kernel.org,
linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org
Subject: Re: [PATCH v2] security: Yama LSM
Date: Wed, 23 Jun 2010 07:54:37 -0700 [thread overview]
Message-ID: <20100623145437.GJ5876@outflux.net> (raw)
In-Reply-To: <877hlqas9e.fsf@basil.nowhere.org>
Hi Andi,
On Wed, Jun 23, 2010 at 01:43:41PM +0200, Andi Kleen wrote:
> Kees Cook <kees.cook@canonical.com> writes:
> > +
> > +config SECURITY_YAMA_SYMLINKS
> > + bool "Yama: protect symlink following in sticky world-writable
> > dirs"
>
> IMHO it's bad style to have CONFIGs that just set defaults,
> if that can be done at runtime too. Especially as in your case if it's
> a lot of settings. Is it that bad to have a init script and drop these
> CONFIGs?
Oh, er, I actually added these configs because Eric Paris recommended them
as handy for distributions. I'm fine with dropping them, but will I be
asked to add them back later? And what about the case of CONFIG_SYSCTL
being unset?
> However the help texts are useful, these should be in the sysctl
> documentatin in Documentation instead.
I documented the sysctls in Documentation/Yama.txt (where SELinux.txt and
Smack.txt live) should I create an additional file in Documentation/sysctl/
with that information (moved from Yama.txt) or move Yama.txt there?
> > + if (rc) {
> > + printk_ratelimited(KERN_INFO "ptrace of non-child"
> > + " pid %d was attempted by: %s (pid %d)\n",
> > + child->pid, get_task_comm(name, current),
> > + current->pid);
>
> It's probably obscure and other kernel code has this too, but at some point
> there were attacks to use terminal ESC sequences to attack root's
> terminal when they dmesg. Couldn't that be done through "comm" here?
I actually think this is a flaw in get_task_comm. (Though actually it's
the fault of terminals if they process dangerous escape sequences. Worst
case tends to just be confusing output, but that's not important --
nothing should spew non-printables regardless.) Would a patch to
get_task_comm be accepted to replace non-printables with "?" or something
when filling the buffer?
Thanks,
-Kees
--
Kees Cook
Ubuntu Security Team
next prev parent reply other threads:[~2010-06-23 14:54 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-06-23 6:52 [PATCH v2] security: Yama LSM Kees Cook
2010-06-23 11:43 ` Andi Kleen
2010-06-23 14:54 ` Kees Cook [this message]
2010-06-23 15:34 ` Andi Kleen
2010-06-23 15:59 ` Alan Cox
2010-06-23 19:10 ` Andi Kleen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20100623145437.GJ5876@outflux.net \
--to=kees.cook@canonical.com \
--cc=andi@firstfloor.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.