[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5j++UT=qG_hc0yC4H0VSMAnq74hrKaBDdoUL=V7HQUAX=A@mail.gmail.com>
Date: Thu, 19 Nov 2015 16:52:02 -0800
From: Kees Cook <keescook@...omium.org>
To: Andrew Morton <akpm@...ux-foundation.org>
Cc: LKML <linux-kernel@...r.kernel.org>,
Dave Chinner <david@...morbit.com>,
Andy Lutomirski <luto@...capital.net>, Jan Kara <jack@...e.cz>,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
Mel Gorman <mgorman@...e.de>,
Johannes Weiner <hannes@...xchg.org>,
Rik van Riel <riel@...hat.com>,
Matthew Wilcox <willy@...ux.intel.com>,
Shachar Raindel <raindel@...lanox.com>,
Boaz Harrosh <boaz@...xistor.com>,
Michal Hocko <mhocko@...e.cz>,
Haggai Eran <haggaie@...lanox.com>,
Theodore Tso <tytso@...gle.com>, Willy Tarreau <w@....eu>,
Dirk Steinmetz <public@...tdrjgfuzkfg.com>,
Michael Kerrisk-manpages <mtk.manpages@...il.com>,
Serge Hallyn <serge.hallyn@...ntu.com>,
Seth Forshee <seth.forshee@...onical.com>,
Alexander Viro <viro@...iv.linux.org.uk>,
Linux FS Devel <linux-fsdevel@...r.kernel.org>,
"Eric W . Biederman" <ebiederm@...ssion.com>,
Serge Hallyn <serge.hallyn@...onical.com>,
Linux-MM <linux-mm@...ck.org>
Subject: Re: [PATCH] fs: clear file set[ug]id when writing via mmap
On Thu, Nov 19, 2015 at 4:41 PM, Andrew Morton
<akpm@...ux-foundation.org> wrote:
> On Thu, 19 Nov 2015 16:10:43 -0800 Kees Cook <keescook@...omium.org> wrote:
>
>> Normally, when a user can modify a file that has setuid or setgid bits,
>> those bits are cleared when they are not the file owner or a member of the
>> group. This is enforced when using write() directly but not when writing
>> to a shared mmap on the file. This could allow the file writer to gain
>> privileges by changing the binary without losing the setuid/setgid bits.
>>
>> Signed-off-by: Kees Cook <keescook@...omium.org>
>> Cc: stable@...r.kernel.org
>> ---
>> mm/memory.c | 1 +
>> 1 file changed, 1 insertion(+)
>>
>> diff --git a/mm/memory.c b/mm/memory.c
>> index deb679c31f2a..4c970a4e0057 100644
>> --- a/mm/memory.c
>> +++ b/mm/memory.c
>> @@ -2036,6 +2036,7 @@ static inline int wp_page_reuse(struct mm_struct *mm,
>>
>> if (!page_mkwrite)
>> file_update_time(vma->vm_file);
>> + file_remove_privs(vma->vm_file);
>> }
>>
>> return VM_FAULT_WRITE;
>
> file_remove_privs() is depressingly heavyweight. You'd think there was
> some more lightweight way of caching the fact that we've already done
> this.
In theory, the IS_NOSEC(inode) should be fast. Perhaps track it in the
vma or file struct?
> Dumb question: can we run file_remove_privs() once, when the file is
> opened writably, rather than for each and every write into each page?
This got discussed briefly, but I can't remember why it got shot down.
> Also, the proposed patch drops the file_remove_privs() return value on
> the floor and we just go ahead with the modification. How come?
Oh, excellent catch. If it can't drop it, it shouldn't be writable.
I'm not sure what the right abort scenario is in wp_page_reuse. Maybe
move this to start of wp_page_shared instead?
-Kees
--
Kees Cook
Chrome OS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists