diff options
| author | Amir Goldstein <amir73il@gmail.com> | 2025-12-07 11:44:55 +0100 |
|---|---|---|
| committer | Jan Kara <jack@suse.cz> | 2025-12-15 10:18:46 +0100 |
| commit | 635bc4def026a24e071436f4f356ea08c0eed6ff (patch) | |
| tree | 0ab252dfdecda3a1546ab04c2de7f422e9fd398f /lib/mpi/mpi-inline.c | |
| parent | 7d0a66e4bb9081d75c82ec4957c50034cb0ea449 (diff) | |
fsnotify: do not generate ACCESS/MODIFY events on child for special files
inotify/fanotify do not allow users with no read access to a file to
subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the
same user to subscribe for watching events on children when the user
has access to the parent directory (e.g. /dev).
Users with no read access to a file but with read access to its parent
directory can still stat the file and see if it was accessed/modified
via atime/mtime change.
The same is not true for special files (e.g. /dev/null). Users will not
generally observe atime/mtime changes when other users read/write to
special files, only when someone sets atime/mtime via utimensat().
Align fsnotify events with this stat behavior and do not generate
ACCESS/MODIFY events to parent watchers on read/write of special files.
The events are still generated to parent watchers on utimensat(). This
closes some side-channels that could be possibly used for information
exfiltration [1].
[1] https://snee.la/pdf/pubs/file-notification-attacks.pdf
Reported-by: Sudheendra Raghav Neela <sneela@tugraz.at>
CC: stable@vger.kernel.org
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Signed-off-by: Jan Kara <jack@suse.cz>
Diffstat (limited to 'lib/mpi/mpi-inline.c')
0 files changed, 0 insertions, 0 deletions
