kernel: Only expose su when daemon is running
authorTom Marshall <tdm.code@gmail.com>
Wed, 25 Jan 2017 17:01:03 +0000 (18:01 +0100)
committerDanny Wood <danwood76@gmail.com>
Fri, 30 Nov 2018 10:58:44 +0000 (10:58 +0000)
commit3f672f0abd22a68f37163133072c8a2b9d290b5f
tree2b133f988b29fc69efe6c9d9fcc1f11105aa9e23
parent6722dfadabb2b5c191ba94156629976f66190671
kernel: Only expose su when daemon is running

It has been claimed that the PG implementation of 'su' has security
vulnerabilities even when disabled.  Unfortunately, the people that
find these vulnerabilities often like to keep them private so they
can profit from exploits while leaving users exposed to malicious
hackers.

In order to reduce the attack surface for vulnerabilites, it is
therefore necessary to make 'su' completely inaccessible when it
is not in use (except by the root and system users).

Change-Id: I79716c72f74d0b7af34ec3a8054896c6559a181d
fs/exec.c
fs/namei.c
fs/readdir.c
include/linux/dcache.h
include/linux/fs.h
include/linux/sched.h
include/linux/uidgid.h
kernel/exit.c
kernel/fork.c
kernel/sched/core.c