Files
linux/security/keys
Eric Biggers 71d8548735 KEYS: restrict /proc/keys by credentials at open time
commit 4aa68e07d8 upstream.

When checking for permission to view keys whilst reading from
/proc/keys, we should use the credentials with which the /proc/keys file
was opened.  This is because, in a classic type of exploit, it can be
possible to bypass checks for the *current* credentials by passing the
file descriptor to a suid program.

Following commit 34dbbcdbf6 ("Make file credentials available to the
seqfile interfaces") we can finally fix it.  So let's do it.

Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Zubin Mithra <zsm@chromium.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2023-05-15 11:54:43 +09:00
..
2017-10-13 11:27:08 +00:00
2016-04-12 19:54:58 +01:00
2016-06-14 10:29:44 +01:00
2017-11-15 16:13:49 +01:00
2017-10-30 09:27:09 +01:00