diff options
author | Andy Lutomirski <luto@amacapital.net> | 2013-04-14 14:44:04 -0400 |
---|---|---|
committer | Andy Lutomirski <luto@amacapital.net> | 2013-04-14 21:11:32 -0400 |
commit | 41c21e351e79004dbb4efa4bc14a53a7e0af38c5 (patch) | |
tree | 09f41257304634a6f2dcf48fd99504924a5344f1 /kernel/user_namespace.c | |
parent | e3211c120a85b792978bcb4be7b2886df18d27f0 (diff) |
userns: Changing any namespace id mappings should require privileges
Changing uid/gid/projid mappings doesn't change your id within the
namespace; it reconfigures the namespace. Unprivileged programs should
*not* be able to write these files. (We're also checking the privileges
on the wrong task.)
Given the write-once nature of these files and the other security
checks, this is likely impossible to usefully exploit.
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Diffstat (limited to 'kernel/user_namespace.c')
-rw-r--r-- | kernel/user_namespace.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/kernel/user_namespace.c b/kernel/user_namespace.c index 5c16f3aa757a..e134d8f365dd 100644 --- a/kernel/user_namespace.c +++ b/kernel/user_namespace.c | |||
@@ -613,10 +613,10 @@ static ssize_t map_write(struct file *file, const char __user *buf, | |||
613 | if (map->nr_extents != 0) | 613 | if (map->nr_extents != 0) |
614 | goto out; | 614 | goto out; |
615 | 615 | ||
616 | /* Require the appropriate privilege CAP_SETUID or CAP_SETGID | 616 | /* |
617 | * over the user namespace in order to set the id mapping. | 617 | * Adjusting namespace settings requires capabilities on the target. |
618 | */ | 618 | */ |
619 | if (cap_valid(cap_setid) && !ns_capable(ns, cap_setid)) | 619 | if (cap_valid(cap_setid) && !file_ns_capable(file, ns, CAP_SYS_ADMIN)) |
620 | goto out; | 620 | goto out; |
621 | 621 | ||
622 | /* Get a buffer */ | 622 | /* Get a buffer */ |