77 lines
2.3 KiB
Diff
77 lines
2.3 KiB
Diff
Allow threads other than the main thread to do introspection of files in
|
|
proc without relying on read permissions. proc_pid_follow_link() calls
|
|
proc_fd_access_allowed() which ultimately calls __ptrace_may_access().
|
|
|
|
Though this allows additional access to some proc files, we do not
|
|
believe that this has any unintended security implications. However it
|
|
probably needs to be looked at carefully.
|
|
|
|
The original problem was a thread of a process whose permissions were
|
|
111 couldn't open its own /proc/self/exe This was interfering with a
|
|
special purpose debugging tool. A simple reproducer is below.:
|
|
|
|
#include <pthread.h>
|
|
#include <unistd.h>
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <stdlib.h>
|
|
#include <sys/types.h>
|
|
|
|
#define BUFSIZE 2048
|
|
|
|
void *thread_main(void *arg){
|
|
char *str=(char*)arg;
|
|
char buf[BUFSIZE];
|
|
ssize_t len=readlink("/proc/self/exe", buf, BUFSIZE);
|
|
if(len==-1)
|
|
printf("/proc/self/exe in %s: %s\n", str,sys_errlist[errno]);
|
|
else
|
|
printf("/proc/self/exe in %s: OK\n", str);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int main(){
|
|
pthread_t thread;
|
|
|
|
int retval=pthread_create( &thread, NULL, thread_main, "thread");
|
|
if(retval!=0)
|
|
exit(1);
|
|
|
|
thread_main("main");
|
|
pthread_join(thread, NULL);
|
|
|
|
exit(0);
|
|
}
|
|
|
|
Signed-off-by: Ben Woodard <woodard@redhat.com>
|
|
Signed-off-by: Mark Grondona <mgrondona@llnl.gov>
|
|
---
|
|
kernel/ptrace.c | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
diff --git a/kernel/ptrace.c b/kernel/ptrace.c
|
|
index acbd284..347c4c7 100644
|
|
--- a/kernel/ptrace.c
|
|
+++ b/kernel/ptrace.c
|
|
diff -ruNp linux-3.8.4-103.fc17.noarch/kernel/ptrace.c linux-3.8.4-103.fc17.ptrace/kernel/ptrace.c
|
|
--- linux-3.8.4-103.fc17.noarch/kernel/ptrace.c 2013-02-18 17:58:34.000000000 -0600
|
|
+++ linux-3.8.4-103.fc17.ptrace/kernel/ptrace.c 2013-03-26 14:59:01.939396346 -0500
|
|
@@ -234,7 +234,7 @@ static int __ptrace_may_access(struct ta
|
|
*/
|
|
int dumpable = 0;
|
|
/* Don't let security modules deny introspection */
|
|
- if (task == current)
|
|
+ if (same_thread_group(task, current))
|
|
return 0;
|
|
rcu_read_lock();
|
|
tcred = __task_cred(task);
|
|
--
|
|
1.8.1.4
|
|
|
|
--
|
|
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
|
|
the body of a message to majordomo@vger.kernel.org
|
|
More majordomo info at http://vger.kernel.org/majordomo-info.html
|
|
Please read the FAQ at http://www.tux.org/lkml/
|