aboutsummaryrefslogtreecommitdiffstats
path: root/kernel
diff options
context:
space:
mode:
authorEric W. Biederman <ebiederm@xmission.com>2014-12-05 18:19:27 -0500
committerEric W. Biederman <ebiederm@xmission.com>2014-12-05 18:19:27 -0500
commit7ff4d90b4c24a03666f296c3d4878cd39001e81e (patch)
tree757293c98c93eec1c5b7caae149c34e49bb824c5 /kernel
parent4fed655c410cc56add64c7b1f7c85c7c56066ac2 (diff)
groups: Consolidate the setgroups permission checks
Today there are 3 instances of setgroups and due to an oversight their permission checking has diverged. Add a common function so that they may all share the same permission checking code. This corrects the current oversight in the current permission checks and adds a helper to avoid this in the future. A user namespace security fix will update this new helper, shortly. Cc: stable@vger.kernel.org Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'kernel')
-rw-r--r--kernel/groups.c9
-rw-r--r--kernel/uid16.c2
2 files changed, 9 insertions, 2 deletions
diff --git a/kernel/groups.c b/kernel/groups.c
index 451698f86cfa..02d8a251c476 100644
--- a/kernel/groups.c
+++ b/kernel/groups.c
@@ -213,6 +213,13 @@ out:
213 return i; 213 return i;
214} 214}
215 215
216bool may_setgroups(void)
217{
218 struct user_namespace *user_ns = current_user_ns();
219
220 return ns_capable(user_ns, CAP_SETGID);
221}
222
216/* 223/*
217 * SMP: Our groups are copy-on-write. We can set them safely 224 * SMP: Our groups are copy-on-write. We can set them safely
218 * without another task interfering. 225 * without another task interfering.
@@ -223,7 +230,7 @@ SYSCALL_DEFINE2(setgroups, int, gidsetsize, gid_t __user *, grouplist)
223 struct group_info *group_info; 230 struct group_info *group_info;
224 int retval; 231 int retval;
225 232
226 if (!ns_capable(current_user_ns(), CAP_SETGID)) 233 if (!may_setgroups())
227 return -EPERM; 234 return -EPERM;
228 if ((unsigned)gidsetsize > NGROUPS_MAX) 235 if ((unsigned)gidsetsize > NGROUPS_MAX)
229 return -EINVAL; 236 return -EINVAL;
diff --git a/kernel/uid16.c b/kernel/uid16.c
index 602e5bbbceff..d58cc4d8f0d1 100644
--- a/kernel/uid16.c
+++ b/kernel/uid16.c
@@ -176,7 +176,7 @@ SYSCALL_DEFINE2(setgroups16, int, gidsetsize, old_gid_t __user *, grouplist)
176 struct group_info *group_info; 176 struct group_info *group_info;
177 int retval; 177 int retval;
178 178
179 if (!ns_capable(current_user_ns(), CAP_SETGID)) 179 if (!may_setgroups())
180 return -EPERM; 180 return -EPERM;
181 if ((unsigned)gidsetsize > NGROUPS_MAX) 181 if ((unsigned)gidsetsize > NGROUPS_MAX)
182 return -EINVAL; 182 return -EINVAL;