[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20141105154318.2555.7052.stgit@warthog.procyon.org.uk>
Date: Wed, 05 Nov 2014 15:43:19 +0000
From: David Howells <dhowells@...hat.com>
To: linux-unionfs@...r.kernel.org, selinux@...ho.nsa.gov
Cc: dhowells@...hat.com, linux-fsdevel@...r.kernel.org,
linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH 6/7] SELinux: The copy-up operation must have read
permission on the lower file
The copy-up operation must have read permission on the lower file for the task
that caused the copy-up. This helps prevent overlayfs from being used to
access something it shouldn't.
Signed-off-by: David Howells <dhowells@...hat.com>
---
security/selinux/hooks.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index f43f07fdc028..57f9c641779f 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -3144,7 +3144,8 @@ static void selinux_inode_getsecid(const struct inode *inode, u32 *secid)
static int selinux_inode_copy_up(struct dentry *src, struct dentry *dst)
{
- return 0;
+ const struct cred *cred = current_cred();
+ return dentry_has_perm(cred, src, FILE__OPEN | FILE__READ);
}
static int selinux_inode_copy_up_xattr(struct dentry *src, struct dentry *dst,
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists