diff options
author | Jan Kara <jack@suse.cz> | 2016-09-19 11:39:09 -0400 |
---|---|---|
committer | Jan Kara <jack@suse.cz> | 2016-09-22 04:55:32 -0400 |
commit | 073931017b49d9458aa351605b43a7e34598caef (patch) | |
tree | 8c4374e82e5cad92bdb589e5be417f1a94870399 /fs/gfs2 | |
parent | 5d3ddd84eaefffd23c028bce5610dac8726f71c1 (diff) |
posix_acl: Clear SGID bit when setting file permissions
When file permissions are modified via chmod(2) and the user is not in
the owning group or capable of CAP_FSETID, the setgid bit is cleared in
inode_change_ok(). Setting a POSIX ACL via setxattr(2) sets the file
permissions as well as the new ACL, but doesn't clear the setgid bit in
a similar way; this allows to bypass the check in chmod(2). Fix that.
References: CVE-2016-7097
Reviewed-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Jan Kara <jack@suse.cz>
Signed-off-by: Andreas Gruenbacher <agruenba@redhat.com>
Diffstat (limited to 'fs/gfs2')
-rw-r--r-- | fs/gfs2/acl.c | 12 |
1 files changed, 3 insertions, 9 deletions
diff --git a/fs/gfs2/acl.c b/fs/gfs2/acl.c index 363ba9e9d8d0..2524807ee070 100644 --- a/fs/gfs2/acl.c +++ b/fs/gfs2/acl.c | |||
@@ -92,17 +92,11 @@ int __gfs2_set_acl(struct inode *inode, struct posix_acl *acl, int type) | |||
92 | if (type == ACL_TYPE_ACCESS) { | 92 | if (type == ACL_TYPE_ACCESS) { |
93 | umode_t mode = inode->i_mode; | 93 | umode_t mode = inode->i_mode; |
94 | 94 | ||
95 | error = posix_acl_equiv_mode(acl, &mode); | 95 | error = posix_acl_update_mode(inode, &inode->i_mode, &acl); |
96 | if (error < 0) | 96 | if (error) |
97 | return error; | 97 | return error; |
98 | 98 | if (mode != inode->i_mode) | |
99 | if (error == 0) | ||
100 | acl = NULL; | ||
101 | |||
102 | if (mode != inode->i_mode) { | ||
103 | inode->i_mode = mode; | ||
104 | mark_inode_dirty(inode); | 99 | mark_inode_dirty(inode); |
105 | } | ||
106 | } | 100 | } |
107 | 101 | ||
108 | if (acl) { | 102 | if (acl) { |