Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752702AbZL2VKq (ORCPT ); Tue, 29 Dec 2009 16:10:46 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752459AbZL2VKp (ORCPT ); Tue, 29 Dec 2009 16:10:45 -0500 Received: from earthlight.etchedpixels.co.uk ([81.2.110.250]:46798 "EHLO www.etchedpixels.co.uk" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752409AbZL2VKo (ORCPT ); Tue, 29 Dec 2009 16:10:44 -0500 Date: Tue, 29 Dec 2009 21:11:39 +0000 From: Alan Cox To: ebiederm@xmission.com (Eric W. Biederman) Cc: Benny Amorsen , Bryan Donlan , "Serge E. Hallyn" , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?UTF-8?B?QW3DqXJpY28=?= Wang , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Al Viro Subject: Re: RFC: disablenetwork facility. (v4) Message-ID: <20091229211139.0732a0c1@lxorguk.ukuu.org.uk> In-Reply-To: References: <20091229050114.GC14362@heat> <20091229151146.GA32153@us.ibm.com> <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> X-Mailer: Claws Mail 3.7.3 (GTK+ 2.18.5; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 826 Lines: 20 > > Execute != read. The executable file may contain secrets which must not > > be available to the user running the setuid program. If you fail the > > setuid, the user will be able to ptrace() and then the secret is > > revealed. > > > > It's amazing how many security holes appear from what seems like a very > > simple request. > > Do we have a security hole in nosuid mount option? > Can someone write a patch to fix it? If a setuid app can read a key when its erroneously not set setuid then the user can read it too. Anything you can do with ptrace you can do yourself ! -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/