Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752863AbZL2Vdw (ORCPT ); Tue, 29 Dec 2009 16:33:52 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752848AbZL2Vdt (ORCPT ); Tue, 29 Dec 2009 16:33:49 -0500 Received: from earthlight.etchedpixels.co.uk ([81.2.110.250]:57084 "EHLO www.etchedpixels.co.uk" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752847AbZL2Vdr (ORCPT ); Tue, 29 Dec 2009 16:33:47 -0500 Date: Tue, 29 Dec 2009 21:35:19 +0000 From: Alan Cox To: Bryan Donlan Cc: "Eric W. Biederman" , Benny Amorsen , "Serge E. Hallyn" , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?UTF-8?B?QW3DqXJpY28=?= Wang , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Al Viro Subject: Re: RFC: disablenetwork facility. (v4) Message-ID: <20091229213519.09644bf9@lxorguk.ukuu.org.uk> In-Reply-To: <3e8340490912291314m5e1b72e6s6e394d0a8cf95d00@mail.gmail.com> References: <20091229050114.GC14362@heat> <20091229151146.GA32153@us.ibm.com> <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> <20091229211139.0732a0c1@lxorguk.ukuu.org.uk> <3e8340490912291314m5e1b72e6s6e394d0a8cf95d00@mail.gmail.com> X-Mailer: Claws Mail 3.7.3 (GTK+ 2.18.5; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 938 Lines: 26 > The security hole is that secrets in a setuid application with > other-exec but no other-read permission can be read when the > filesystem is mounted nosuid. Erm no We enforce the following anyway to prevent execution being permitted to make file copies. Most Unixen do although its historical value is primarily to prevent people "stealing valuable proprietary intellectual software assets". } else if (file_permission(bprm->file, MAY_READ) || bprm->interp_flags & BINPRM_FLAGS_ENFORCE_NONDUMP) { set_dumpable(current->mm, suid_dumpable); } There does appear to be a small race in modern versions of that code which wants swatting. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/