From: Paul Moore <[email protected]> commit 35a196bef449b5824033865b963ed9a43fb8c730 upstream.
Prevent userspace from changing the the /proc/PID/attr values if the task's credentials are currently overriden. This not only makes sense conceptually, it also prevents some really bizarre error cases caused when trying to commit credentials to a task with overridden credentials. Cc: <[email protected]> Reported-by: "chengjian (D)" <[email protected]> Signed-off-by: Paul Moore <[email protected]> Acked-by: John Johansen <[email protected]> Acked-by: James Morris <[email protected]> Acked-by: Casey Schaufler <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]> --- fs/proc/base.c | 5 +++++ 1 file changed, 5 insertions(+) --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -2550,6 +2550,11 @@ static ssize_t proc_pid_attr_write(struc rcu_read_unlock(); return -EACCES; } + /* Prevent changes to overridden credentials. */ + if (current_cred() != current_real_cred()) { + rcu_read_unlock(); + return -EBUSY; + } rcu_read_unlock(); if (count > PAGE_SIZE)

