linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 0/2] exec: Use sane stack rlimit for setuid exec
@ 2017-07-07 19:56 Kees Cook
  2017-07-07 19:56 ` [PATCH 1/2] exec: Move security_bprm_secureexec() earlier Kees Cook
                   ` (3 more replies)
  0 siblings, 4 replies; 11+ messages in thread
From: Kees Cook @ 2017-07-07 19:56 UTC (permalink / raw)
  To: linux-security-module

As discussed with Linus and Andy, we need to reset the stack rlimit
before we do memory layouts when execing a privilege-gaining (e.g.
setuid) program. This moves security_bprm_secureexec() earlier (with
required changes), and then lowers the stack limit when appropriate.

As a side-effect, dumpability is expanded to cover capabilities and
other LSM definitions of secureexec, and Smack can drop its special
handler for pdeath_signal clearing.

I'd appreciate some extra eyes on this to make sure this isn't
broken in some special way. I couldn't find anything that _depended_
on security_bprm_secureexec() being called late.

Thanks!

-Kees

--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2017-07-08  3:59 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-07-07 19:56 [PATCH 0/2] exec: Use sane stack rlimit for setuid exec Kees Cook
2017-07-07 19:56 ` [PATCH 1/2] exec: Move security_bprm_secureexec() earlier Kees Cook
2017-07-07 19:57 ` [PATCH 2/2] exec: Use sane stack rlimit for setuid exec Kees Cook
2017-07-07 20:04 ` [PATCH 0/2] " Linus Torvalds
2017-07-07 20:09   ` Linus Torvalds
2017-07-07 22:10     ` Kees Cook
2017-07-07 22:13   ` Kees Cook
2017-07-07 22:39     ` Linus Torvalds
2017-07-08  3:59   ` Kees Cook
2017-07-07 21:55 ` Andy Lutomirski
2017-07-07 22:19   ` Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).