[CVE-2015-2925][Vivid][PATCH 2/2] vfs: Test for and handle paths that are unreachable from their mnt_root

Stefan Bader stefan.bader at canonical.com
Tue Oct 6 08:05:41 UTC 2015


On 05.10.2015 14:58, Luis Henriques wrote:
> From: "Eric W. Biederman" <ebiederm at xmission.com>
> 
> commit 397d425dc26da728396e66d392d5dcb8dac30c37 upstream.
> 
> In rare cases a directory can be renamed out from under a bind mount.
> In those cases without special handling it becomes possible to walk up
> the directory tree to the root dentry of the filesystem and down
> from the root dentry to every other file or directory on the filesystem.
> 
> Like division by zero .. from an unconnected path can not be given
> a useful semantic as there is no predicting at which path component
> the code will realize it is unconnected.  We certainly can not match
> the current behavior as the current behavior is a security hole.
> 
> Therefore when encounting .. when following an unconnected path
> return -ENOENT.
> 
> - Add a function path_connected to verify path->dentry is reachable
>   from path->mnt.mnt_root.  AKA to validate that rename did not do
>   something nasty to the bind mount.
> 
>   To avoid races path_connected must be called after following a path
>   component to it's next path component.
> 
> Signed-off-by: "Eric W. Biederman" <ebiederm at xmission.com>
> Signed-off-by: Al Viro <viro at zeniv.linux.org.uk>
> CVE-2015-2925
> BugLink: https://bugs.launchpad.net/bugs/1441108
> Signed-off-by: Luis Henriques <luis.henriques at canonical.com>
> ---
>  fs/namei.c | 31 ++++++++++++++++++++++++++++---
>  1 file changed, 28 insertions(+), 3 deletions(-)
> 
> diff --git a/fs/namei.c b/fs/namei.c
> index 27007985ba76..1db59ccbae7d 100644
> --- a/fs/namei.c
> +++ b/fs/namei.c
> @@ -500,6 +500,24 @@ struct nameidata {
>  	char *saved_names[MAX_NESTED_LINKS + 1];
>  };
>  
> +/**
> + * path_connected - Verify that a path->dentry is below path->mnt.mnt_root
> + * @path: nameidate to verify
> + *
> + * Rename can sometimes move a file or directory outside of a bind
> + * mount, path_connected allows those cases to be detected.
> + */
> +static bool path_connected(const struct path *path)
> +{
> +	struct vfsmount *mnt = path->mnt;
> +
> +	/* Only bind mounts can have disconnected paths */
> +	if (mnt->mnt_root == mnt->mnt_sb->s_root)
> +		return true;
> +
> +	return is_subdir(path->dentry, mnt->mnt_root);
> +}
> +
>  /*
>   * Path walking has 2 modes, rcu-walk and ref-walk (see
>   * Documentation/filesystems/path-lookup.txt).  In situations when we can't
> @@ -1189,6 +1207,8 @@ static int follow_dotdot_rcu(struct nameidata *nd)
>  				goto failed;
>  			nd->path.dentry = parent;
>  			nd->seq = seq;
> +			if (unlikely(!path_connected(&nd->path)))
> +				goto failed;
>  			break;
>  		}
>  		if (!follow_up_rcu(&nd->path))
> @@ -1285,7 +1305,7 @@ static void follow_mount(struct path *path)
>  	}
>  }
>  
> -static void follow_dotdot(struct nameidata *nd)
> +static int follow_dotdot(struct nameidata *nd)
>  {
>  	if (!nd->root.mnt)
>  		set_root(nd);
> @@ -1301,6 +1321,10 @@ static void follow_dotdot(struct nameidata *nd)
>  			/* rare case of legitimate dget_parent()... */
>  			nd->path.dentry = dget_parent(nd->path.dentry);
>  			dput(old);

> +			if (unlikely(!path_connected(&nd->path))) {
> +				path_put(&nd->path);
> +				return -ENOENT;

This being a backport by upstream for a cve I should probably have more
confidence in what they did. But here I worry a bit. The additional path_put
here looks to be a result (together with the replacement of goto below for
mountpoint_last) of working around changes done by:

commit deb106c632d73c96b6b2b5ca71bacb8aef38fc7b
Author: Al Viro <viro at zeniv.linux.org.uk>
Date:   Fri May 8 18:05:21 2015 -0400

    namei: lift terminate_walk() all the way up

which moved the call to terminate_walk() up to higher level in the call stack.
And one thing terminate_walk() does is to do the path_pt (for non rcu case).

> +			}
>  			break;
>  		}
>  		if (!follow_up(&nd->path))
> @@ -1308,6 +1332,7 @@ static void follow_dotdot(struct nameidata *nd)
>  	}
>  	follow_mount(&nd->path);
>  	nd->inode = nd->path.dentry->d_inode;
> +	return 0;
>  }
>  
>  /*
> @@ -1528,7 +1553,7 @@ static inline int handle_dots(struct nameidata *nd, int type)
>  			if (follow_dotdot_rcu(nd))
>  				return -ECHILD;
>  		} else
> -			follow_dotdot(nd);
> +			return follow_dotdot(nd);
>  	}
>  	return 0;
>  }
> @@ -2263,7 +2288,7 @@ mountpoint_last(struct nameidata *nd, struct path *path)
>  	if (unlikely(nd->last_type != LAST_NORM)) {
>  		error = handle_dots(nd, nd->last_type);
>  		if (error)
> -			goto out;
> +			return error;
>  		dentry = dget(nd->path.dentry);
>  		goto done;

So here either follow_dotdot_rcu() or follow dotdot() are called and the "goto
out" in the error case would call terminate_walk() which I assume has not been
added to the higher level function in Vivid. So I wonder a bit whether the right
change would be to not add this hunk and neither add the path_put...

-Stefan

>  	}
> 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20151006/d3b1b55a/attachment.sig>


More information about the kernel-team mailing list