Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750723AbVIRJMq (ORCPT ); Sun, 18 Sep 2005 05:12:46 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750728AbVIRJMq (ORCPT ); Sun, 18 Sep 2005 05:12:46 -0400 Received: from mail.enyo.de ([212.9.189.167]:45467 "EHLO mail.enyo.de") by vger.kernel.org with ESMTP id S1750723AbVIRJMp convert rfc822-to-8bit (ORCPT ); Sun, 18 Sep 2005 05:12:45 -0400 From: Florian Weimer To: linux-kernel@vger.kernel.org Subject: CAN-2001-1551 Date: Sun, 18 Sep 2005 11:12:37 +0200 Message-ID: <874q8ig2nu.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 964 Lines: 21 Has this issue been fixed? Or is this not a kernel bug? | From: Wojciech Purczy?ski (wpsupermedia.pl) | Date: Mon Oct 22 2001 - 03:43:13 CDT | | Almost any suid binary may be used to create large files overriding quota | limits. | | When setuid-root binary inherits file descriptors from user process it may | write to it without respecting the quota restrictions. This is because | suid process has CAP_SYS_RESOURCE effective capability enabled during | writing to the file. Quota does not know anything about who opened file | descriptor and checks current process privileges only. This is bug in | kernel and not in those setuid-root binaries. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/