aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/user_namespace.c
diff options
context:
space:
mode:
authorAndy Lutomirski <luto@amacapital.net>2013-04-14 14:44:04 -0400
committerAndy Lutomirski <luto@amacapital.net>2013-04-14 21:11:32 -0400
commit41c21e351e79004dbb4efa4bc14a53a7e0af38c5 (patch)
tree09f41257304634a6f2dcf48fd99504924a5344f1 /kernel/user_namespace.c
parente3211c120a85b792978bcb4be7b2886df18d27f0 (diff)
userns: Changing any namespace id mappings should require privileges
Changing uid/gid/projid mappings doesn't change your id within the namespace; it reconfigures the namespace. Unprivileged programs should *not* be able to write these files. (We're also checking the privileges on the wrong task.) Given the write-once nature of these files and the other security checks, this is likely impossible to usefully exploit. Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Diffstat (limited to 'kernel/user_namespace.c')
-rw-r--r--kernel/user_namespace.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/kernel/user_namespace.c b/kernel/user_namespace.c
index 5c16f3aa757a..e134d8f365dd 100644
--- a/kernel/user_namespace.c
+++ b/kernel/user_namespace.c
@@ -613,10 +613,10 @@ static ssize_t map_write(struct file *file, const char __user *buf,
613 if (map->nr_extents != 0) 613 if (map->nr_extents != 0)
614 goto out; 614 goto out;
615 615
616 /* Require the appropriate privilege CAP_SETUID or CAP_SETGID 616 /*
617 * over the user namespace in order to set the id mapping. 617 * Adjusting namespace settings requires capabilities on the target.
618 */ 618 */
619 if (cap_valid(cap_setid) && !ns_capable(ns, cap_setid)) 619 if (cap_valid(cap_setid) && !file_ns_capable(file, ns, CAP_SYS_ADMIN))
620 goto out; 620 goto out;
621 621
622 /* Get a buffer */ 622 /* Get a buffer */