fs: Limit file caps to the user namespace of the super block
Capability sets attached to files must be ignored except in the user namespaces where the mounter is privileged, i.e. s_user_ns and its descendants. Otherwise a vector exists for gaining privileges in namespaces where a user is not already privileged. Add a new helper function, current_in_user_ns(), to test whether a user namespace is the same as or a descendant of another namespace. Use this helper to determine whether a file's capability set should be applied to the caps constructed during exec. --EWB Replaced in_userns with the simpler current_in_userns. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
This commit is contained in:
parent
cc50a07a24
commit
d07b846f62
3 changed files with 22 additions and 0 deletions
|
@ -938,6 +938,20 @@ bool userns_may_setgroups(const struct user_namespace *ns)
|
|||
return allowed;
|
||||
}
|
||||
|
||||
/*
|
||||
* Returns true if @ns is the same namespace as or a descendant of
|
||||
* @target_ns.
|
||||
*/
|
||||
bool current_in_userns(const struct user_namespace *target_ns)
|
||||
{
|
||||
struct user_namespace *ns;
|
||||
for (ns = current_user_ns(); ns; ns = ns->parent) {
|
||||
if (ns == target_ns)
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
static inline struct user_namespace *to_user_ns(struct ns_common *ns)
|
||||
{
|
||||
return container_of(ns, struct user_namespace, ns);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue