Restricting path name lookup with openat2()
Restricting path name lookup with openat2()
Posted Aug 23, 2019 4:55 UTC (Fri) by epa (subscriber, #39769)Parent article: Restricting path name lookup with openat2()
Posted Aug 23, 2019 12:00 UTC (Fri)
by cyphar (subscriber, #110703)
[Link] (6 responses)
Posted Aug 23, 2019 12:38 UTC (Fri)
by Paf (subscriber, #91811)
[Link] (5 responses)
Posted Aug 23, 2019 16:50 UTC (Fri)
by NYKevin (subscriber, #129325)
[Link] (4 responses)
The only way an attacker can go after that is to 1) ptrace you or 2) already be running code in your process. If either of those is the case, then you've already lost.
Posted Aug 23, 2019 20:05 UTC (Fri)
by epa (subscriber, #39769)
[Link] (3 responses)
Posted Aug 24, 2019 5:40 UTC (Sat)
by cyphar (subscriber, #110703)
[Link] (2 responses)
This isn't all a hypothetical -- my first draft of the syscall did just add a new argument, and I discovered pretty quickly (while writing the selftests) that it was abysmal to actually use that interface. The fact that C zeroes out structs when you do designated initialisation makes using structs so much more straightforward here. All of that being said, I'm not married to the current interface at all. If the only concern people have with the patches is what the syscall looks like, I'm more than happy to change it.
Posted Aug 24, 2019 8:00 UTC (Sat)
by epa (subscriber, #39769)
[Link] (1 responses)
Posted Aug 24, 2019 8:26 UTC (Sat)
by cyphar (subscriber, #110703)
[Link]
Restricting path name lookup with openat2()
Restricting path name lookup with openat2()
Restricting path name lookup with openat2()
Restricting path name lookup with openat2()
Restricting path name lookup with openat2()
Restricting path name lookup with openat2()
Restricting path name lookup with openat2()
