Smack: change rule cap check 59/23259/1
authorCasey Schaufler <casey@schaufler-ca.com>
Thu, 19 Dec 2013 21:23:26 +0000 (13:23 -0800)
committerRafal Krypa <r.krypa@samsung.com>
Fri, 20 Jun 2014 15:17:40 +0000 (17:17 +0200)
smk_write_change_rule() is calling capable rather than
the more correct smack_privileged(). This allows for setting
rules in violation of the onlycap facility. This is the
simple repair.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Change-Id: I473b1f610e0bc8f349babfac440b77e26fb1f073
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
security/smack/smackfs.c

index f5a6bb8e282848e8ec1247c7d46e881b92b5a814..3198cfe1dcc69fb0bcc158940c030cd125105ed5 100644 (file)
@@ -2152,7 +2152,7 @@ static ssize_t smk_write_change_rule(struct file *file, const char __user *buf,
        /*
         * Must have privilege.
         */
-       if (!capable(CAP_MAC_ADMIN))
+       if (!smack_privileged(CAP_MAC_ADMIN))
                return -EPERM;
 
        return smk_write_rules_list(file, buf, count, ppos, NULL, NULL,