1. 14 Aug, 2009 1 commit
    • Eric Paris's avatar
      Networking: use CAP_NET_ADMIN when deciding to call request_module · a8f80e8f
      Eric Paris authored
      
      The networking code checks CAP_SYS_MODULE before using request_module() to
      try to load a kernel module.  While this seems reasonable it's actually
      weakening system security since we have to allow CAP_SYS_MODULE for things
      like /sbin/ip and bluetoothd which need to be able to trigger module loads.
      CAP_SYS_MODULE actually grants those binaries the ability to directly load
      any code into the kernel.  We should instead be protecting modprobe and the
      modules on disk, rather than granting random programs the ability to load code
      directly into the kernel.  Instead we are going to gate those networking checks
      on CAP_NET_ADMIN which still limits them to root but which does not grant
      those processes the ability to load arbitrary code into the kernel.
      Signed-off-by: default avatarEric Paris <eparis@redhat.com>
      Acked-by: default avatarSerge Hallyn <serue@us.ibm.com>
      Acked-by: default avatarPaul Moore <paul.moore@hp.com>
      Acked-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: James Morr...
      a8f80e8f
  2. 10 Aug, 2009 23 commits
  3. 09 Aug, 2009 16 commits