diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2014-12-05 18:19:27 -0500 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2014-12-05 18:19:27 -0500 |
commit | 7ff4d90b4c24a03666f296c3d4878cd39001e81e (patch) | |
tree | 757293c98c93eec1c5b7caae149c34e49bb824c5 /kernel | |
parent | 4fed655c410cc56add64c7b1f7c85c7c56066ac2 (diff) |
groups: Consolidate the setgroups permission checks
Today there are 3 instances of setgroups and due to an oversight their
permission checking has diverged. Add a common function so that
they may all share the same permission checking code.
This corrects the current oversight in the current permission checks
and adds a helper to avoid this in the future.
A user namespace security fix will update this new helper, shortly.
Cc: stable@vger.kernel.org
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/groups.c | 9 | ||||
-rw-r--r-- | kernel/uid16.c | 2 |
2 files changed, 9 insertions, 2 deletions
diff --git a/kernel/groups.c b/kernel/groups.c index 451698f86cfa..02d8a251c476 100644 --- a/kernel/groups.c +++ b/kernel/groups.c | |||
@@ -213,6 +213,13 @@ out: | |||
213 | return i; | 213 | return i; |
214 | } | 214 | } |
215 | 215 | ||
216 | bool may_setgroups(void) | ||
217 | { | ||
218 | struct user_namespace *user_ns = current_user_ns(); | ||
219 | |||
220 | return ns_capable(user_ns, CAP_SETGID); | ||
221 | } | ||
222 | |||
216 | /* | 223 | /* |
217 | * SMP: Our groups are copy-on-write. We can set them safely | 224 | * SMP: Our groups are copy-on-write. We can set them safely |
218 | * without another task interfering. | 225 | * without another task interfering. |
@@ -223,7 +230,7 @@ SYSCALL_DEFINE2(setgroups, int, gidsetsize, gid_t __user *, grouplist) | |||
223 | struct group_info *group_info; | 230 | struct group_info *group_info; |
224 | int retval; | 231 | int retval; |
225 | 232 | ||
226 | if (!ns_capable(current_user_ns(), CAP_SETGID)) | 233 | if (!may_setgroups()) |
227 | return -EPERM; | 234 | return -EPERM; |
228 | if ((unsigned)gidsetsize > NGROUPS_MAX) | 235 | if ((unsigned)gidsetsize > NGROUPS_MAX) |
229 | return -EINVAL; | 236 | return -EINVAL; |
diff --git a/kernel/uid16.c b/kernel/uid16.c index 602e5bbbceff..d58cc4d8f0d1 100644 --- a/kernel/uid16.c +++ b/kernel/uid16.c | |||
@@ -176,7 +176,7 @@ SYSCALL_DEFINE2(setgroups16, int, gidsetsize, old_gid_t __user *, grouplist) | |||
176 | struct group_info *group_info; | 176 | struct group_info *group_info; |
177 | int retval; | 177 | int retval; |
178 | 178 | ||
179 | if (!ns_capable(current_user_ns(), CAP_SETGID)) | 179 | if (!may_setgroups()) |
180 | return -EPERM; | 180 | return -EPERM; |
181 | if ((unsigned)gidsetsize > NGROUPS_MAX) | 181 | if ((unsigned)gidsetsize > NGROUPS_MAX) |
182 | return -EINVAL; | 182 | return -EINVAL; |