mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	exec: Always set cap_ambient in cap_bprm_set_creds
An invariant of cap_bprm_set_creds is that every field in the new cred
structure that cap_bprm_set_creds might set, needs to be set every
time to ensure the fields does not get a stale value.
The field cap_ambient is not set every time cap_bprm_set_creds is
called, which means that if there is a suid or sgid script with an
interpreter that has neither the suid nor the sgid bits set the
interpreter should be able to accept ambient credentials.
Unfortuantely because cap_ambient is not reset to it's original value
the interpreter can not accept ambient credentials.
Given that the ambient capability set is expected to be controlled by
the caller, I don't think this is particularly serious.  But it is
definitely worth fixing so the code works correctly.
I have tested to verify my reading of the code is correct and the
interpreter of a sgid can receive ambient capabilities with this
change and cannot receive ambient capabilities without this change.
Cc: stable@vger.kernel.org
Cc: Andy Lutomirski <luto@kernel.org>
Fixes: 58319057b7 ("capabilities: ambient capabilities")
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
			
			
This commit is contained in:
		
							parent
							
								
									6a8b55ed40
								
							
						
					
					
						commit
						a4ae32c71f
					
				
					 1 changed files with 1 additions and 0 deletions
				
			
		| 
						 | 
					@ -812,6 +812,7 @@ int cap_bprm_set_creds(struct linux_binprm *bprm)
 | 
				
			||||||
	int ret;
 | 
						int ret;
 | 
				
			||||||
	kuid_t root_uid;
 | 
						kuid_t root_uid;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						new->cap_ambient = old->cap_ambient;
 | 
				
			||||||
	if (WARN_ON(!cap_ambient_invariant_ok(old)))
 | 
						if (WARN_ON(!cap_ambient_invariant_ok(old)))
 | 
				
			||||||
		return -EPERM;
 | 
							return -EPERM;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue