summaryrefslogtreecommitdiffstats
path: root/kernel
diff options
context:
space:
mode:
authorSeth Forshee <seth.forshee@canonical.com>2016-04-26 21:36:24 +0200
committerEric W. Biederman <ebiederm@xmission.com>2016-07-01 01:05:09 +0200
commit5f65e5ca286126a60f62c8421b77c2018a482b8a (patch)
tree6587f9ff0d9454050803e76d7347ca26bd75d73a /kernel
parentfs: Check for invalid i_uid in may_follow_link() (diff)
downloadlinux-5f65e5ca286126a60f62c8421b77c2018a482b8a.tar.xz
linux-5f65e5ca286126a60f62c8421b77c2018a482b8a.zip
cred: Reject inodes with invalid ids in set_create_file_as()
Using INVALID_[UG]ID for the LSM file creation context doesn't make sense, so return an error if the inode passed to set_create_file_as() has an invalid id. Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Diffstat (limited to 'kernel')
-rw-r--r--kernel/cred.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/kernel/cred.c b/kernel/cred.c
index 0c0cd8a62285..5f264fb5737d 100644
--- a/kernel/cred.c
+++ b/kernel/cred.c
@@ -689,6 +689,8 @@ EXPORT_SYMBOL(set_security_override_from_ctx);
*/
int set_create_files_as(struct cred *new, struct inode *inode)
{
+ if (!uid_valid(inode->i_uid) || !gid_valid(inode->i_gid))
+ return -EINVAL;
new->fsuid = inode->i_uid;
new->fsgid = inode->i_gid;
return security_kernel_create_files_as(new, inode);