Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1762746Ab2FVV5P (ORCPT ); Fri, 22 Jun 2012 17:57:15 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:51314 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753628Ab2FVV5N (ORCPT ); Fri, 22 Jun 2012 17:57:13 -0400 Date: Fri, 22 Jun 2012 14:57:11 -0700 From: Andrew Morton To: Kees Cook Cc: linux-kernel@vger.kernel.org, Alan Cox , "Eric W. Biederman" , Alexander Viro , Rob Landley , Ingo Molnar , Peter Zijlstra , Doug Ledford , Marcel Holtmann , Serge Hallyn , Joe Korty , David Howells , James Morris , linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v3] fs: introduce pipe-only dump mode suid_dumpable=3 Message-Id: <20120622145711.d7f720cd.akpm@linux-foundation.org> In-Reply-To: References: <20120622192413.GA5774@www.outflux.net> <20120622125551.269552c2.akpm@linux-foundation.org> <20120622143435.c1ba744e.akpm@linux-foundation.org> X-Mailer: Sylpheed 3.0.2 (GTK+ 2.20.1; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 709 Lines: 16 On Fri, 22 Jun 2012 14:51:54 -0700 Kees Cook wrote: > > And how serious is the security vulnerability, in real-world terms? > > Serious enough to risk this amount of bustage? > > If they're running in mode "2" and they do not have a coredump pipe > handler defined, local users can gain root access. But the kernel can detect this case and avoid it? If we do that at the same time, we can avoid any mode=2 non-back-compatible breakage? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/