summaryrefslogtreecommitdiffstats
path: root/kernel/groups.c
diff options
context:
space:
mode:
authorThomas Cedeno <thomascedeno@google.com>2020-07-16 21:13:57 +0200
committerMicah Morton <mortonm@chromium.org>2020-10-13 18:17:34 +0200
commit111767c1d86bd9661f8b72ace50cbcb13507a1bf (patch)
treeeb61e1cd69c7b43ce363d8cde1c67ae0751eeb37 /kernel/groups.c
parentLinux 5.9 (diff)
downloadlinux-111767c1d86bd9661f8b72ace50cbcb13507a1bf.tar.xz
linux-111767c1d86bd9661f8b72ace50cbcb13507a1bf.zip
LSM: Signal to SafeSetID when setting group IDs
For SafeSetID to properly gate set*gid() calls, it needs to know whether ns_capable() is being called from within a sys_set*gid() function or is being called from elsewhere in the kernel. This allows SafeSetID to deny CAP_SETGID to restricted groups when they are attempting to use the capability for code paths other than updating GIDs (e.g. setting up userns GID mappings). This is the identical approach to what is currently done for CAP_SETUID. NOTE: We also add signaling to SafeSetID from the setgroups() syscall, as we have future plans to restrict a process' ability to set supplementary groups in addition to what is added in this series for restricting setting of the primary group. Signed-off-by: Thomas Cedeno <thomascedeno@google.com> Signed-off-by: Micah Morton <mortonm@chromium.org>
Diffstat (limited to 'kernel/groups.c')
-rw-r--r--kernel/groups.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/groups.c b/kernel/groups.c
index 6ee6691f6839..fe7e6385530e 100644
--- a/kernel/groups.c
+++ b/kernel/groups.c
@@ -178,7 +178,7 @@ bool may_setgroups(void)
{
struct user_namespace *user_ns = current_user_ns();
- return ns_capable(user_ns, CAP_SETGID) &&
+ return ns_capable_setid(user_ns, CAP_SETGID) &&
userns_may_setgroups(user_ns);
}