Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp1176474rwp; Thu, 13 Jul 2023 07:15:11 -0700 (PDT) X-Google-Smtp-Source: APBJJlFSa+eaCIWZ8WPlVW6X/zAaUukKRMPVqX34h0sNwakgUIl6CROhBLBuL+qYWB7TOtIWGy+Z X-Received: by 2002:a17:906:212:b0:992:6656:4043 with SMTP id 18-20020a170906021200b0099266564043mr1477224ejd.53.1689257710936; Thu, 13 Jul 2023 07:15:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689257710; cv=none; d=google.com; s=arc-20160816; b=CdcRMGn1pe46jzOVCzlOwO0yxfeDLmHwGDVpiJm5aPto6uG+I1GsQD6JXb5qC4b7CY djvaJwGuT0QCRBtrdSH3VPoZNe1TzncXZkwbBoxkgeP23mRd5Z85FsdmtTbpBQkKAlp8 dz7weAwyZt7/35KXjgZ46LT1wL8j+p+S4GBREchOuBBrAF+J/eh+E6Z2LF/AmSBu58/W yBUhJEji0P1pBjGsYgxS8qj9MUUyGuCJyAU8BYdOzQnsS7LBcBDZHDjtHmKQTRtApomR G9Aj9ZDdFmxD3k3U1nE2OT73U889zvVhJmoi9XAjv+Tgh7UHJL/Xr5PgDReJ7Mshx/r8 0Cdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=xpxD6jJvH2NdvxBxxbA/xwwWPK026oBkIsxvhSiVppQ=; fh=80EcQrpyHzL58Jy88N9lIhkFKkifH6SnDSa88w8Z9bY=; b=Xwh7HivJ5xJDDccZVfSOIHLJ0yQgtBNLS4Z9z7bGKpdylNWA6vZeq1wlawvpHoHeWU DnZ3jEBS3V3cZyOsy1v2awsRHiGJyvPNJnJMKnrSADM94DE4QCyytDYHOU3LaCKyldg/ Uaeou6WKi8JxeqmwBzEeTl+JRyBAWTe2DjjYNKqVRhOh6gEDfew2d6x08RLIycLLk4ES ae7irQnovjclTmJT6oXrWirhE90wKFV94b7757Pdv32sf5P1cRSId1YXGRhs4zbxd+Jn fGBTL3sHKloJdzliHVJJVKvnV85rWg+yNA20ZX3uz2YHAe20iWV+8n54pFeuqKr7alZ2 g77w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cyphar.com header.s=MBO0001 header.b=J67hj0as; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cyphar.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mh4-20020a170906eb8400b009937e7c4e53si6641298ejb.343.2023.07.13.07.14.46; Thu, 13 Jul 2023 07:15:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@cyphar.com header.s=MBO0001 header.b=J67hj0as; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cyphar.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234730AbjGMNgs (ORCPT + 99 others); Thu, 13 Jul 2023 09:36:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39878 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235076AbjGMNgo (ORCPT ); Thu, 13 Jul 2023 09:36:44 -0400 X-Greylist: delayed 2401 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 13 Jul 2023 06:36:37 PDT Received: from mout-p-103.mailbox.org (mout-p-103.mailbox.org [IPv6:2001:67c:2050:0:465::103]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1F81C2D40; Thu, 13 Jul 2023 06:36:36 -0700 (PDT) Received: from smtp1.mailbox.org (smtp1.mailbox.org [10.196.197.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-103.mailbox.org (Postfix) with ESMTPS id 4R1tvC4NGRz9sn9; Thu, 13 Jul 2023 14:19:03 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cyphar.com; s=MBO0001; t=1689250743; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=xpxD6jJvH2NdvxBxxbA/xwwWPK026oBkIsxvhSiVppQ=; b=J67hj0asCAtelzLhPQXRrS+E99al7I+BMNtQLJqGszQMeBH8Oi6tEK67X9nMQw4qlX7wnP +LA3S4+9ltR61EsvICm2rmjjJXhQ3MkQ89Ht0WK+0Y2DpXvYW0cThade6zZUIV/YXFgiJD 3X888cF2MvyASCky3OlN1BCR1QiJprtt/kc5/V+OD2qO2Dsbhq6GtGsv5sozeysXT4uFdv RexNELuNQXxbzZjT3OAHIVJrVyE0Z2GrrCDmMnlJ+EPOH+ntjEukAwcxeynzUATx00+/ec O1KjlREZGDtSYA82dFoqVAaaphuq3Hv/WOjIPJKcrjfKmzjiwIYCZKXlsDEZ+A== From: Aleksa Sarai To: Willy Tarreau , Shuah Khan , Christian Brauner , Andrew Morton , Dave Chinner , Al Viro , xu xin , Zhihao Cheng , Chao Yu , "Liam R. Howlett" , Janis Danisevskis , Kees Cook Cc: Aleksa Sarai , stable@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [PATCH] procfs: block chmod on /proc/thread-self/comm Date: Thu, 13 Jul 2023 22:17:50 +1000 Message-ID: <20230713121752.8039-1-cyphar@cyphar.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Due to an oversight in commit 1b3044e39a89 ("procfs: fix pthread cross-thread naming if !PR_DUMPABLE") in switching from REG to NOD, chmod operations on /proc/thread-self/comm were no longer blocked as they are on almost all other procfs files. A very similar situation with /proc/self/environ was used to as a root exploit a long time ago, but procfs has SB_I_NOEXEC so this is simply a correctness issue. Ref: https://lwn.net/Articles/191954/ Ref: 6d76fa58b050 ("Don't allow chmod() on the /proc// files") Fixes: 1b3044e39a89 ("procfs: fix pthread cross-thread naming if !PR_DUMPABLE") Cc: stable@vger.kernel.org # v4.7+ Signed-off-by: Aleksa Sarai --- fs/proc/base.c | 3 ++- tools/testing/selftests/nolibc/nolibc-test.c | 4 ++++ 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/fs/proc/base.c b/fs/proc/base.c index 05452c3b9872..7394229816f3 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -3583,7 +3583,8 @@ static int proc_tid_comm_permission(struct mnt_idmap *idmap, } static const struct inode_operations proc_tid_comm_inode_operations = { - .permission = proc_tid_comm_permission, + .setattr = proc_setattr, + .permission = proc_tid_comm_permission, }; /* diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c index 486334981e60..08f0969208eb 100644 --- a/tools/testing/selftests/nolibc/nolibc-test.c +++ b/tools/testing/selftests/nolibc/nolibc-test.c @@ -580,6 +580,10 @@ int run_syscall(int min, int max) CASE_TEST(chmod_net); EXPECT_SYSZR(proc, chmod("/proc/self/net", 0555)); break; CASE_TEST(chmod_self); EXPECT_SYSER(proc, chmod("/proc/self", 0555), -1, EPERM); break; CASE_TEST(chown_self); EXPECT_SYSER(proc, chown("/proc/self", 0, 0), -1, EPERM); break; + CASE_TEST(chmod_self_comm); EXPECT_SYSER(proc, chmod("/proc/self/comm", 0777), -1, EPERM); break; + CASE_TEST(chmod_tid_comm); EXPECT_SYSER(proc, chmod("/proc/thread-self/comm", 0777), -1, EPERM); break; + CASE_TEST(chmod_self_environ);EXPECT_SYSER(proc, chmod("/proc/self/environ", 0777), -1, EPERM); break; + CASE_TEST(chmod_tid_environ); EXPECT_SYSER(proc, chmod("/proc/thread-self/environ", 0777), -1, EPERM); break; CASE_TEST(chroot_root); EXPECT_SYSZR(euid0, chroot("/")); break; CASE_TEST(chroot_blah); EXPECT_SYSER(1, chroot("/proc/self/blah"), -1, ENOENT); break; CASE_TEST(chroot_exe); EXPECT_SYSER(proc, chroot("/proc/self/exe"), -1, ENOTDIR); break; -- 2.41.0