Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2634040pxj; Mon, 14 Jun 2021 03:36:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzeGmCm8/23MHueJ0G1/DH88qkPR04+P71KxTln6/ILCkYIL5/FNP4fN/dKEXVPKBHDqzqP X-Received: by 2002:aa7:cfd4:: with SMTP id r20mr16294422edy.237.1623666990422; Mon, 14 Jun 2021 03:36:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623666990; cv=none; d=google.com; s=arc-20160816; b=mcDNphmCGvRXv+9j6Tv5GCURlxUehQwWQB6vovAVDMdOqh14nXIjmBfSKAwe3TPPTO OkkTL4YmoW8Rr5wqA1JkMxgBqGdN7y/tremlNprN148E0jU+T49KupIpfl2yMmHOsBry yrLg52bTfNxrNTaGgLkJrmTH35vwwrO80o9GHege7qLAi0iG/WC97EbRhE2D8zJNTtdt OIxFl3LF95Z+8GBe9J75+mF4YBH1/QNcICCYrvqTEOLIkApCjYD1XRAI8Sfel/gBRj0h 4sDG39+D7cXTm7KWIUm13S032nNkAqHQfrq7hiGRcvfa4pW1c7ileg2wANfKpbSbru8B gToQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=gzxv0eXk13WzzugduZyT0Lu9JGTpYMaHY78gWLU9c2Q=; b=qiBXNrZTG9/wYJ+qYPIMIxiHk+UbykmUgBOdaqHLFcA5p959bngfhVyLMIWgmNQstH 89y479iHl8AS/GmxEgMBeCfDtDwS/rZCRdpkCfnM8U3+wWsAy2tCNJknpQZUl/3Xm/RU 1lUoLqZQb4eY889PROCEc/h/YDWwhdtzwhAqADm9ombnsVHmFmvWhfrqbNdJgiBRn1Ws w1JGb4RndmdgPXC2KLwHm1XWwPX5ve+xuvad39TRuBDJ+tjROW7M4T7M9RvlkUx3tr81 B6RxJ4e+lvG0TaIQq9pXJm//f7EiEg2x9XvxoFs6J5mgKshsjaCeN/2fEe/TRFoXRlWc vfUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ibK9ZTbE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f11si11237982eje.327.2021.06.14.03.36.07; Mon, 14 Jun 2021 03:36:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ibK9ZTbE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233590AbhFNKgN (ORCPT + 99 others); Mon, 14 Jun 2021 06:36:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:39656 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233331AbhFNKdp (ORCPT ); Mon, 14 Jun 2021 06:33:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id D1F48610CD; Mon, 14 Jun 2021 10:31:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623666696; bh=4aPX0//u/3JeT8vGv8fonz1hEqbVWhCL/+IXpbQsW7U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ibK9ZTbEvSqwA+H6uDoeY50M3sXpzXD5URftkUJM1WYdAQo1tLacv2WzOeB8o/ng6 +TlmgYeQq4r7xDBOFB8KAoZWbsBisTU30N/1HbmwdqDTwrIS387wGDhpV4X5ZpgkrT VYOgiTIdrK9pNXjAoS5QyB+1VfN2KxjiXhvyfZbw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christian Brauner , Andrea Righi , Kees Cook , Linus Torvalds Subject: [PATCH 4.9 01/42] proc: Track /proc/$pid/attr/ opener mm_struct Date: Mon, 14 Jun 2021 12:26:52 +0200 Message-Id: <20210614102642.750066628@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210614102642.700712386@linuxfoundation.org> References: <20210614102642.700712386@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kees Cook commit 591a22c14d3f45cc38bd1931c593c221df2f1881 upstream. Commit bfb819ea20ce ("proc: Check /proc/$pid/attr/ writes against file opener") tried to make sure that there could not be a confusion between the opener of a /proc/$pid/attr/ file and the writer. It used struct cred to make sure the privileges didn't change. However, there were existing cases where a more privileged thread was passing the opened fd to a differently privileged thread (during container setup). Instead, use mm_struct to track whether the opener and writer are still the same process. (This is what several other proc files already do, though for different reasons.) Reported-by: Christian Brauner Reported-by: Andrea Righi Tested-by: Andrea Righi Fixes: bfb819ea20ce ("proc: Check /proc/$pid/attr/ writes against file opener") Cc: stable@vger.kernel.org Signed-off-by: Kees Cook Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/proc/base.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -2493,6 +2493,11 @@ out: } #ifdef CONFIG_SECURITY +static int proc_pid_attr_open(struct inode *inode, struct file *file) +{ + return __mem_open(inode, file, PTRACE_MODE_READ_FSCREDS); +} + static ssize_t proc_pid_attr_read(struct file * file, char __user * buf, size_t count, loff_t *ppos) { @@ -2523,7 +2528,7 @@ static ssize_t proc_pid_attr_write(struc struct task_struct *task = get_proc_task(inode); /* A task may only write when it was the opener. */ - if (file->f_cred != current_real_cred()) + if (file->private_data != current->mm) return -EPERM; length = -ESRCH; @@ -2561,9 +2566,11 @@ out_no_task: } static const struct file_operations proc_pid_attr_operations = { + .open = proc_pid_attr_open, .read = proc_pid_attr_read, .write = proc_pid_attr_write, .llseek = generic_file_llseek, + .release = mem_release, }; static const struct pid_entry attr_dir_stuff[] = {