| commit | 433bf5d912d511c9ae49d6c1a6a473c476cd1788 | [log] [tgz] |
|---|---|---|
| author | Kees Cook <keescook@chromium.org> | Sat Sep 21 15:52:51 2013 -0700 |
| committer | Kees Cook <keescook@chromium.org> | Sun Oct 02 21:56:37 2016 -0700 |
| tree | 4e86c7c146800ecef083cd1805ca3e44a8dfa921 | |
| parent | c8d2bc9bc39ebea8437fd974fdbc21847bb897a3 [diff] |
LSM: MntRestrict blocks mounts on symlink targets On systems where certain filesystem contents cannot be entirely trusted, it is beneficial to block mounts on symlinks. This makes sure that malicious filesystem contents cannot trigger the over-mounting of trusted filesystems. (For example, a bind-mounted subdirectory of /var cannot be redirected to mount on /etc via a symlink: a daemon cannot elevate privs to uid-0.) Signed-off-by: Kees Cook <keescook@chromium.org>