]> git.karo-electronics.de Git - karo-tx-linux.git/commit
vfs: fix permission checking in sys_utimensat
authorMiklos Szeredi <mszeredi@suse.cz>
Thu, 1 May 2008 18:45:34 +0000 (18:45 +0000)
committerGreg Kroah-Hartman <gregkh@suse.de>
Sat, 10 May 2008 04:40:44 +0000 (21:40 -0700)
commitf9dfda1ad0637a89a64d001cf81478bd8d9b6306
tree7a03c73d6bb6ed79a0d7d1ff464092ad32902e12
parent9bd2c7ca75b0ebe05b0c67852d050720119983e7
vfs: fix permission checking in sys_utimensat

commit: 02c6be615f1fcd37ac5ed93a3ad6692ad8991cd9 upstream

If utimensat() is called with both times set to UTIME_NOW or one of them to
UTIME_NOW and the other to UTIME_OMIT, then it will update the file time
without any permission checking.

I don't think this can be used for anything other than a local DoS, but could
be quite bewildering at that (e.g.  "Why was that large source tree rebuilt
when I didn't modify anything???")

This affects all kernels from 2.6.22, when the utimensat() syscall was
introduced.

Fix by doing the same permission checking as for the "times == NULL" case.

Thanks to Michael Kerrisk, whose utimensat-non-conformances-and-fixes.patch in
-mm also fixes this (and breaks other stuff), only he didn't realize the
security implications of this bug.

Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
Cc: Ulrich Drepper <drepper@redhat.com>
Cc: Michael Kerrisk <mtk-manpages@gmx.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
fs/utimes.c