Commit ae41bfc6 authored by Vasily Averin's avatar Vasily Averin Committed by Greg Kroah-Hartman

security_syslog() should be called once only

commit d194e5d6 upstream.

The final version of commit 637241a9 ("kmsg: honor dmesg_restrict
sysctl on /dev/kmsg") lost few hooks, as result security_syslog() are
processed incorrectly:

- open of /dev/kmsg checks syslog access permissions by using
  check_syslog_permissions() where security_syslog() is not called if
  dmesg_restrict is set.

- syslog syscall and /proc/kmsg calls do_syslog() where security_syslog
  can be executed twice (inside check_syslog_permissions() and then
  directly in do_syslog())

With this patch security_syslog() is called once only in all
syslog-related operations regardless of dmesg_restrict value.

Fixes: 637241a9 ("kmsg: honor dmesg_restrict sysctl on /dev/kmsg")
Signed-off-by: default avatarVasily Averin <vvs@virtuozzo.com>
Cc: Kees Cook <keescook@chromium.org>
Cc: Josh Boyer <jwboyer@redhat.com>
Cc: Eric Paris <eparis@redhat.com>
Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent f843b096
...@@ -484,11 +484,11 @@ int check_syslog_permissions(int type, bool from_file) ...@@ -484,11 +484,11 @@ int check_syslog_permissions(int type, bool from_file)
* already done the capabilities checks at open time. * already done the capabilities checks at open time.
*/ */
if (from_file && type != SYSLOG_ACTION_OPEN) if (from_file && type != SYSLOG_ACTION_OPEN)
return 0; goto ok;
if (syslog_action_restricted(type)) { if (syslog_action_restricted(type)) {
if (capable(CAP_SYSLOG)) if (capable(CAP_SYSLOG))
return 0; goto ok;
/* /*
* For historical reasons, accept CAP_SYS_ADMIN too, with * For historical reasons, accept CAP_SYS_ADMIN too, with
* a warning. * a warning.
...@@ -498,10 +498,11 @@ int check_syslog_permissions(int type, bool from_file) ...@@ -498,10 +498,11 @@ int check_syslog_permissions(int type, bool from_file)
"CAP_SYS_ADMIN but no CAP_SYSLOG " "CAP_SYS_ADMIN but no CAP_SYSLOG "
"(deprecated).\n", "(deprecated).\n",
current->comm, task_pid_nr(current)); current->comm, task_pid_nr(current));
return 0; goto ok;
} }
return -EPERM; return -EPERM;
} }
ok:
return security_syslog(type); return security_syslog(type);
} }
...@@ -1263,10 +1264,6 @@ int do_syslog(int type, char __user *buf, int len, bool from_file) ...@@ -1263,10 +1264,6 @@ int do_syslog(int type, char __user *buf, int len, bool from_file)
if (error) if (error)
goto out; goto out;
error = security_syslog(type);
if (error)
return error;
switch (type) { switch (type) {
case SYSLOG_ACTION_CLOSE: /* Close log */ case SYSLOG_ACTION_CLOSE: /* Close log */
break; break;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment