Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753170AbcKQXau (ORCPT ); Thu, 17 Nov 2016 18:30:50 -0500 Received: from mail-ua0-f170.google.com ([209.85.217.170]:34568 "EHLO mail-ua0-f170.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753019AbcKQXaE (ORCPT ); Thu, 17 Nov 2016 18:30:04 -0500 MIME-Version: 1.0 In-Reply-To: <87inrmavax.fsf_-_@xmission.com> References: <87twcbq696.fsf@x220.int.ebiederm.org> <20161018135031.GB13117@dhcp22.suse.cz> <8737jt903u.fsf@xmission.com> <20161018150507.GP14666@pc.thejh.net> <87twc9656s.fsf@xmission.com> <20161018191206.GA1210@laptop.thejh.net> <87r37dnz74.fsf@xmission.com> <87k2d5nytz.fsf_-_@xmission.com> <87y41kjn6l.fsf@xmission.com> <20161019172917.GE1210@laptop.thejh.net> <87pomwi5p2.fsf@xmission.com> <87pomwghda.fsf@xmission.com> <87twb6avk8.fsf_-_@xmission.com> <87inrmavax.fsf_-_@xmission.com> From: Andy Lutomirski Date: Thu, 17 Nov 2016 15:29:43 -0800 Message-ID: Subject: Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file To: "Eric W. Biederman" Cc: Linux Containers , Oleg Nesterov , "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , Linux FS Devel , Michal Hocko , Jann Horn , Willy Tarreau , Kees Cook Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1379 Lines: 40 On Thu, Nov 17, 2016 at 9:08 AM, Eric W. Biederman wrote: > > It is the reasonable expectation that if an executable file is not > readable there will be no way for a user without special privileges to > read the file. This is enforced in ptrace_attach but if we are > already attached there is no enforcement if a readonly executable > is exec'd. > > Therefore do the simple thing and if there is a non-dumpable > executable that we are tracing without privilege fail to exec it. > > Fixes: v1.0 > Cc: stable@vger.kernel.org > Reported-by: Andy Lutomirski > Signed-off-by: "Eric W. Biederman" > --- > fs/exec.c | 8 +++++++- > 1 file changed, 7 insertions(+), 1 deletion(-) > > diff --git a/fs/exec.c b/fs/exec.c > index fdec760bfac3..de107f74e055 100644 > --- a/fs/exec.c > +++ b/fs/exec.c > @@ -1230,6 +1230,11 @@ int flush_old_exec(struct linux_binprm * bprm) > { > int retval; > > + /* Fail if the tracer can't read the executable */ > + if ((bprm->interp_flags & BINPRM_FLAGS_ENFORCE_NONDUMP) && > + !ptracer_capable(current, bprm->mm->user_ns)) > + return -EPERM; > + At the very least, I think that BINPRM_FLAGS_ENFORCE_NONDUMP needs to check capable_wrt_inode_uidgid too. Otherwise we risk breaking: $ gcc whatever.c $ chmod 400 a.out $ strace a.out