public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace
@ 2014-04-29 13:49 Marian Marinov
  2014-04-29 18:35 ` Theodore Ts'o
  0 siblings, 1 reply; 28+ messages in thread
From: Marian Marinov @ 2014-04-29 13:49 UTC (permalink / raw)
  To: containers, LXC development mailing-list,
	linux-kernel@vger.kernel.org

Hello,
when using user namespaces I found a bug in the capability checks done by ioctl.

If someone tries to use chattr +i while in a different user namespace it will get the following:

ioctl(3, EXT2_IOC_SETFLAGS, 0x7fffa4fedacc) = -1 EPERM (Operation not permitted)

I'm proposing a fix to this, by replacing the capable(CAP_LINUX_IMMUTABLE) check with 
ns_capable(current_cred()->user_ns, CAP_LINUX_IMMUTABLE).

If you agree I can send patches for all filesystems.

I'm proposing the following patch:

---
  fs/ext4/ioctl.c | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/fs/ext4/ioctl.c b/fs/ext4/ioctl.c
index d011b69..25683d0 100644
--- a/fs/ext4/ioctl.c
+++ b/fs/ext4/ioctl.c
@@ -265,7 +265,7 @@ long ext4_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
                  * This test looks nicer. Thanks to Pauline Middelink
                  */
                 if ((flags ^ oldflags) & (EXT4_APPEND_FL | EXT4_IMMUTABLE_FL)) {
-                       if (!capable(CAP_LINUX_IMMUTABLE))
+                       if (!ns_capable(current_cred()->user_ns, CAP_LINUX_IMMUTABLE))
                                 goto flags_out;
                 }

-- 
1.8.4


-- 
Marian Marinov
Founder & CEO of 1H Ltd.
Jabber/GTalk: hackman@jabber.org
ICQ: 7556201
Mobile: +359 886 660 270

^ permalink raw reply related	[flat|nested] 28+ messages in thread

end of thread, other threads:[~2014-04-30 13:33 UTC | newest]

Thread overview: 28+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-04-29 13:49 ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace Marian Marinov
2014-04-29 18:35 ` Theodore Ts'o
2014-04-29 18:52   ` Serge Hallyn
2014-04-29 21:49     ` Marian Marinov
2014-04-29 22:02       ` Serge Hallyn
2014-04-29 22:24         ` Marian Marinov
2014-04-29 22:29           ` Serge Hallyn
2014-04-29 22:45             ` Andy Lutomirski
2014-04-29 23:06               ` Theodore Ts'o
2014-04-29 23:07                 ` Andy Lutomirski
2014-04-29 23:20               ` Marian Marinov
2014-04-29 23:22                 ` Andy Lutomirski
2014-04-29 23:47                   ` Stéphane Graber
2014-04-29 23:51                     ` Andy Lutomirski
2014-04-30  0:01                       ` Stéphane Graber
2014-04-30  0:10                         ` Marian Marinov
2014-04-30  0:12                           ` Andy Lutomirski
2014-04-30  0:11                         ` Andy Lutomirski
2014-04-30  0:21                           ` Serge Hallyn
2014-04-30  0:23                             ` Andy Lutomirski
2014-04-30  0:44                               ` Serge Hallyn
2014-04-30  1:03                                 ` Andy Lutomirski
2014-04-30  0:16               ` Serge Hallyn
2014-04-30  0:32                 ` Theodore Ts'o
2014-04-30  0:33                   ` Andy Lutomirski
2014-04-30  0:40                   ` Serge Hallyn
2014-04-30  7:48                   ` Eric W. Biederman
2014-04-30 13:33                     ` Serge Hallyn

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox