Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 4f189988 authored by Paul Moore's avatar Paul Moore
Browse files

selinux: reject setexeccon() on MNT_NOSUID applications with -EACCES



We presently prevent processes from using setexecon() to set the
security label of exec()'d processes when NO_NEW_PRIVS is enabled by
returning an error; however, we silently ignore setexeccon() when
exec()'ing from a nosuid mounted filesystem.  This patch makes things
a bit more consistent by returning an error in the setexeccon()/nosuid
case.

Signed-off-by: default avatarPaul Moore <pmoore@redhat.com>
Acked-by: default avatarAndy Lutomirski <luto@amacapital.net>
Acked-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent 626b9740
Loading
Loading
Loading
Loading
+4 −2
Original line number Diff line number Diff line
@@ -2123,11 +2123,13 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm)
		new_tsec->exec_sid = 0;

		/*
		 * Minimize confusion: if no_new_privs and a transition is
		 * explicitly requested, then fail the exec.
		 * Minimize confusion: if no_new_privs or nosuid and a
		 * transition is explicitly requested, then fail the exec.
		 */
		if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)
			return -EPERM;
		if (bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID)
			return -EACCES;
	} else {
		/* Check for a default transition on this program. */
		rc = security_transition_sid(old_tsec->sid, isec->sid,