From: Paul Moore <[email protected]>

commit 35a196bef449b5824033865b963ed9a43fb8c730 upstream.

Prevent userspace from changing the the /proc/PID/attr values if the
task's credentials are currently overriden.  This not only makes sense
conceptually, it also prevents some really bizarre error cases caused
when trying to commit credentials to a task with overridden
credentials.

Cc: <[email protected]>
Reported-by: "chengjian (D)" <[email protected]>
Signed-off-by: Paul Moore <[email protected]>
Acked-by: John Johansen <[email protected]>
Acked-by: James Morris <[email protected]>
Acked-by: Casey Schaufler <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
 fs/proc/base.c |    5 +++++
 1 file changed, 5 insertions(+)

--- a/fs/proc/base.c
+++ b/fs/proc/base.c
@@ -2550,6 +2550,11 @@ static ssize_t proc_pid_attr_write(struc
                rcu_read_unlock();
                return -EACCES;
        }
+       /* Prevent changes to overridden credentials. */
+       if (current_cred() != current_real_cred()) {
+               rcu_read_unlock();
+               return -EBUSY;
+       }
        rcu_read_unlock();
 
        if (count > PAGE_SIZE)


Reply via email to