aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorAndrew G. Morgan <morgan@kernel.org>2008-01-21 20:18:30 -0500
committerLinus Torvalds <torvalds@woody.linux-foundation.org>2008-01-21 22:39:41 -0500
commita6dbb1ef2fc8d73578eacd02ac701f4233175c9f (patch)
treeeb2efa0193cdc7ab6b1f30068571194d0dabf230 /security
parenta10336043b8193ec603ad54bb79cdcd26bbf94b3 (diff)
Fix filesystem capability support
In linux-2.6.24-rc1, security/commoncap.c:cap_inh_is_capped() was introduced. It has the exact reverse of its intended behavior. This led to an unintended privilege esculation involving a process' inheritable capability set. To be exposed to this bug, you need to have Filesystem Capabilities enabled and in use. That is: - CONFIG_SECURITY_FILE_CAPABILITIES must be defined for the buggy code to be compiled in. - You also need to have files on your system marked with fI bits raised. Signed-off-by: Andrew G. Morgan <morgan@kernel.org> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@akpm@linux-foundation.org>
Diffstat (limited to 'security')
-rw-r--r--security/commoncap.c13
1 files changed, 10 insertions, 3 deletions
diff --git a/security/commoncap.c b/security/commoncap.c
index 5bc1895f3f9..ea61bc73f6d 100644
--- a/security/commoncap.c
+++ b/security/commoncap.c
@@ -59,6 +59,12 @@ int cap_netlink_recv(struct sk_buff *skb, int cap)
59 59
60EXPORT_SYMBOL(cap_netlink_recv); 60EXPORT_SYMBOL(cap_netlink_recv);
61 61
62/*
63 * NOTE WELL: cap_capable() cannot be used like the kernel's capable()
64 * function. That is, it has the reverse semantics: cap_capable()
65 * returns 0 when a task has a capability, but the kernel's capable()
66 * returns 1 for this case.
67 */
62int cap_capable (struct task_struct *tsk, int cap) 68int cap_capable (struct task_struct *tsk, int cap)
63{ 69{
64 /* Derived from include/linux/sched.h:capable. */ 70 /* Derived from include/linux/sched.h:capable. */
@@ -107,10 +113,11 @@ static inline int cap_block_setpcap(struct task_struct *target)
107static inline int cap_inh_is_capped(void) 113static inline int cap_inh_is_capped(void)
108{ 114{
109 /* 115 /*
110 * return 1 if changes to the inheritable set are limited 116 * Return 1 if changes to the inheritable set are limited
111 * to the old permitted set. 117 * to the old permitted set. That is, if the current task
118 * does *not* possess the CAP_SETPCAP capability.
112 */ 119 */
113 return !cap_capable(current, CAP_SETPCAP); 120 return (cap_capable(current, CAP_SETPCAP) != 0);
114} 121}
115 122
116#else /* ie., ndef CONFIG_SECURITY_FILE_CAPABILITIES */ 123#else /* ie., ndef CONFIG_SECURITY_FILE_CAPABILITIES */