oss-sec mailing list archives
Linux peer_cred Mischmasch
From: Sebastian Krahmer <krahmer () suse de>
Date: Tue, 22 Jul 2014 12:15:54 +0200
Hi There seem to be some inconsistencies in the handling of peer credentials on UNIX sockets. I checked kernel 3.15.1 and runtime-tested on a 3.11.10. While maybe_add_creds() (via SOCK_PASSCRED) and scm_send() (via unix_{stream,dgram}_sendmsg()) use the real UID, cred_to_ucred() (via SO_PEERCRED) passes the EUID (this time also kuid_munged()). That should probably being consolidated and in particular its unclear to me why one time you need kuid munging and onother time you dont. Sebastian -- ~ perl self.pl ~ $_='print"\$_=\47$_\47;eval"';eval ~ krahmer () suse de - SuSE Security Team
Current thread:
- Linux peer_cred Mischmasch Sebastian Krahmer (Jul 22)
- Re: Linux peer_cred Mischmasch Simon McVittie (Jul 22)
- Re: Linux peer_cred Mischmasch Florian Weimer (Jul 22)
- Re: Linux peer_cred Mischmasch Andy Lutomirski (Jul 22)
- Re: Re: Linux peer_cred Mischmasch Sebastian Krahmer (Jul 22)
- Re: Linux peer_cred Mischmasch Andy Lutomirski (Jul 24)
- Re: Linux peer_cred Mischmasch Andy Lutomirski (Jul 22)