linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 0/2] exec: Use sane stack rlimit for setuid exec
@ 2017-07-07 19:56 Kees Cook
  2017-07-07 19:56 ` [PATCH 1/2] exec: Move security_bprm_secureexec() earlier Kees Cook
                   ` (3 more replies)
  0 siblings, 4 replies; 11+ messages in thread
From: Kees Cook @ 2017-07-07 19:56 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Kees Cook, Andy Lutomirski, David Howells, Serge Hallyn,
	John Johansen, Casey Schaufler, Eric W. Biederman, Michal Hocko,
	Ben Hutchings, Hugh Dickins, Oleg Nesterov, Jason A. Donenfeld,
	Rik van Riel, Alexander Viro, James Morris, Greg Ungerer,
	Ingo Molnar, Nicolas Pitre, Stephen Smalley, Paul Moore,
	Vivek Goyal, Mickaël Salaün, Tetsuo Handa,
	linux-fsdevel, linux-kernel, linux-security-module

As discussed with Linus and Andy, we need to reset the stack rlimit
before we do memory layouts when execing a privilege-gaining (e.g.
setuid) program. This moves security_bprm_secureexec() earlier (with
required changes), and then lowers the stack limit when appropriate.

As a side-effect, dumpability is expanded to cover capabilities and
other LSM definitions of secureexec, and Smack can drop its special
handler for pdeath_signal clearing.

I'd appreciate some extra eyes on this to make sure this isn't
broken in some special way. I couldn't find anything that _depended_
on security_bprm_secureexec() being called late.

Thanks!

-Kees

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2017-07-08  3:59 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-07-07 19:56 [PATCH 0/2] exec: Use sane stack rlimit for setuid exec Kees Cook
2017-07-07 19:56 ` [PATCH 1/2] exec: Move security_bprm_secureexec() earlier Kees Cook
2017-07-07 19:57 ` [PATCH 2/2] exec: Use sane stack rlimit for setuid exec Kees Cook
2017-07-07 20:04 ` [PATCH 0/2] " Linus Torvalds
2017-07-07 20:09   ` Linus Torvalds
2017-07-07 22:10     ` Kees Cook
2017-07-07 22:13   ` Kees Cook
2017-07-07 22:39     ` Linus Torvalds
2017-07-08  3:59   ` Kees Cook
2017-07-07 21:55 ` Andy Lutomirski
2017-07-07 22:19   ` Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).