public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] sysctl.conf: prevent unintentional writes into attacker-controlled files and FIFOs
@ 2020-10-05 14:12 Peter Müller
  0 siblings, 0 replies; only message in thread
From: Peter Müller @ 2020-10-05 14:12 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1119 bytes --]

Similar to hard- and symlink protection introduced a while ago, this
patch enables protections against unintentional writes into
attacker-controlled regular files or FIFOs, where a program expected to
create new ones. This makes exploiting TOCTOU flaws harder.

See also: https://www.kernel.org/doc/Documentation/sysctl/fs.txt

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 config/etc/sysctl.conf | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
index d48c7734e..be7c07c85 100644
--- a/config/etc/sysctl.conf
+++ b/config/etc/sysctl.conf
@@ -49,6 +49,11 @@ kernel.dmesg_restrict = 1
 fs.protected_symlinks = 1
 fs.protected_hardlinks = 1
 
+# Don't allow writes to files and FIFOs that we don't own in world writable sticky
+# directories, unless they are owned by the owner of the directory.
+fs.protected_fifos = 2
+fs.protected_regular = 2
+
 # Minimal preemption granularity for CPU-bound tasks:
 # (default: 1 msec#  (1 + ilog(ncpus)), units: nanoseconds)
 kernel.sched_min_granularity_ns = 10000000
-- 
2.26.2

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2020-10-05 14:12 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-10-05 14:12 [PATCH] sysctl.conf: prevent unintentional writes into attacker-controlled files and FIFOs Peter Müller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox