summaryrefslogtreecommitdiff
path: root/.github/FUNDING.yml
diff options
context:
space:
mode:
authorLiav A <liavalb@gmail.com>2022-12-23 13:51:47 +0200
committerBrian Gianforcaro <b.gianfo@gmail.com>2022-12-30 15:49:37 -0500
commite598f22768aa281dbf1f907f652472b3bc088271 (patch)
treec03f29b0ab0f880e27fbf03f040e70e867b80f1e /.github/FUNDING.yml
parent0e010790a4f602a2b5a38514d607830d1c0df402 (diff)
downloadserenity-e598f22768aa281dbf1f907f652472b3bc088271.zip
Kernel: Disallow executing SUID binaries if process is jailed
Check if the process we are currently running is in a jail, and if that is the case, fail early with the EPERM error code. Also, as Brian noted, we should also disallow attaching to a jail in case of already running within a setid executable, as this leaves the user with false thinking of being secure (because you can't exec new setid binaries), but the current program is still marked setid, which means that at the very least we gained permissions while we didn't expect it, so let's block it.
Diffstat (limited to '.github/FUNDING.yml')
0 files changed, 0 insertions, 0 deletions