Ubuntu-focal-kernel/security
Konstantin Andreev 101b57a6ee smack: unix sockets: fix accept()ed socket label
BugLink: https://bugs.launchpad.net/bugs/2081278

[ Upstream commit e86cac0acdb1a74f608bacefe702f2034133a047 ]

When a process accept()s connection from a unix socket
(either stream or seqpacket)
it gets the socket with the label of the connecting process.

For example, if a connecting process has a label 'foo',
the accept()ed socket will also have 'in' and 'out' labels 'foo',
regardless of the label of the listener process.

This is because kernel creates unix child sockets
in the context of the connecting process.

I do not see any obvious way for the listener to abuse
alien labels coming with the new socket, but,
to be on the safe side, it's better fix new socket labels.

Signed-off-by: Konstantin Andreev <andreev@swemel.ru>
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Koichiro Den <koichiro.den@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2024-09-27 10:50:31 +02:00
..
apparmor apparmor: fix possible NULL pointer dereference 2024-09-27 10:50:30 +02:00
integrity ima: Fix use-after-free on a dentry's dname.name 2024-08-28 13:31:45 +02:00
keys security: keys: perform capable check only on privileged operations 2023-10-30 11:42:06 +01:00
loadpin
lockdown UBUNTU: SAUCE: debug: Lock down kgdb 2022-05-21 11:27:20 -03:00
safesetid
selinux selinux: fix potential counting error in avc_add_xperms_decision() 2024-09-27 10:50:22 +02:00
smack smack: unix sockets: fix accept()ed socket label 2024-09-27 10:50:31 +02:00
tomoyo tomoyo: fix UAF write bug in tomoyo_write_control() 2024-04-26 10:54:04 +02:00
yama
Kconfig fortify: Explicitly disable Clang support 2022-01-13 18:42:48 +01:00
Kconfig.hardening
Makefile
commoncap.c capabilities: fix potential memleak on error path from vfs_getxattr_alloc() 2023-01-06 08:44:44 -08:00
device_cgroup.c device_cgroup: Roll back to original exceptions after copy failure 2023-02-01 15:23:28 +01:00
inode.c
lsm_audit.c dump_common_audit_data(): fix racy accesses to ->d_name 2021-02-19 16:44:53 +01:00
min_addr.c
security.c lsm: new security_file_ioctl_compat() hook 2024-03-28 15:18:44 +01:00