OSDN Git Service

Documentation: Clarify f_cred vs current_cred() use
authorKees Cook <keescook@chromium.org>
Fri, 3 Jul 2020 17:44:22 +0000 (10:44 -0700)
committerJonathan Corbet <corbet@lwn.net>
Sun, 5 Jul 2020 20:04:45 +0000 (14:04 -0600)
When making access control choices from a file-based context, f_cred
must be used instead of current_cred() to avoid confused deputy attacks
where an open file may get passed to a more privileged process. Add a
short paragraph to explicitly state the rationale.

Cc: Jonathan Corbet <corbet@lwn.net>
Cc: linux-doc@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/202007031038.8833A35DE4@keescook
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Documentation/security/credentials.rst

index 282e79f..b7482f8 100644 (file)
@@ -548,6 +548,10 @@ pointer will not change over the lifetime of the file struct, and nor will the
 contents of the cred struct pointed to, barring the exceptions listed above
 (see the Task Credentials section).
 
+To avoid "confused deputy" privilege escalation attacks, access control checks
+during subsequent operations on an opened file should use these credentials
+instead of "current"'s credentials, as the file may have been passed to a more
+privileged process.
 
 Overriding the VFS's Use of Credentials
 =======================================