]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
fs: Check for invalid i_uid in may_follow_link()
authorSeth Forshee <seth.forshee@canonical.com>
Tue, 26 Apr 2016 19:36:23 +0000 (14:36 -0500)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 15 Sep 2016 06:20:25 +0000 (08:20 +0200)
commit5ac21f6892f662da82344862a5500cff2fffda5c
treeb034ffda0d92eb6d6bb13a97e7580c31c489ca0e
parentfc08184d38909a70596ccdf6acc49b4f7723266c
fs: Check for invalid i_uid in may_follow_link()

commit 2d7f9e2ad35e4e7a3086231f19bfab33c6a8a64a upstream.

Filesystem uids which don't map into a user namespace may result
in inode->i_uid being INVALID_UID. A symlink and its parent
could have different owners in the filesystem can both get
mapped to INVALID_UID, which may result in following a symlink
when this would not have otherwise been permitted when protected
symlinks are enabled.

Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
fs/namei.c