[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#845564: marked as done (jessie-pu: package lxc/1:1.0.6-6+deb8u5)



Your message dated Sat, 14 Jan 2017 12:37:03 +0000
with message-id <1484397423.1091.25.camel@adam-barratt.org.uk>
and subject line Closing requests included in today's point release
has caused the Debian Bug report #845564,
regarding jessie-pu: package lxc/1:1.0.6-6+deb8u5
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
845564: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845564
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian.org@packages.debian.org
Usertags: pu

Ohai,

even if lxc/1:1.0.6-6+deb8u4 did not reach stable yet (see #844150),
we would like to fix another bug in stable:
 #845465 aka CVE-2016-8649: attach: do not send procfd to attached process
it was marked as non-dsa by the security team as it is not exploitable
in the default config we ship in Jessie, yet it would be nice to have it fixed.

the debdiff between the jessie-pu-accepted deb8u4 and the new u5 is attached.

Thanks for all your work
Evgeni

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.8.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff --git a/debian/changelog b/debian/changelog
index a025ddc..65b7aad 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+lxc (1:1.0.6-6+deb8u5) jessie; urgency=medium
+
+  * attach: do not send procfd to attached process
+    Closes: #845465
+    CVE-2016-8649
+
+ -- Evgeni Golov <evgeni@debian.org>  Thu, 24 Nov 2016 08:14:36 +0100
+
 lxc (1:1.0.6-6+deb8u4) jessie; urgency=medium
 
   * fix Alpine Linux container creation
diff --git a/debian/patches/0026-CVE-2016-8649_do-not-send-procfd-to-attached-process.patch b/debian/patches/0026-CVE-2016-8649_do-not-send-procfd-to-attached-process.patch
new file mode 100644
index 0000000..fe09268
--- /dev/null
+++ b/debian/patches/0026-CVE-2016-8649_do-not-send-procfd-to-attached-process.patch
@@ -0,0 +1,485 @@
+From 9f27a4102459c85ce32383f08e08e1c9b5f40119 Mon Sep 17 00:00:00 2001
+From: Christian Brauner <christian.brauner@canonical.com>
+Date: Fri, 18 Nov 2016 16:46:42 +0100
+Subject: [PATCH] attach: do not send procfd to attached process
+
+So far, we opened a file descriptor refering to proc on the host inside the
+host namespace and handed that fd to the attached process in
+attach_child_main(). This was done to ensure that LSM labels were correctly
+setup. However, by exploiting a potential kernel bug, ptrace could be used to
+prevent the file descriptor from being closed which in turn could be used by an
+unprivileged container to gain access to the host namespace. Aside from this
+needing an upstream kernel fix, we should make sure that we don't pass the fd
+for proc itself to the attached process. However, we cannot completely prevent
+this, as the attached process needs to be able to change its apparmor profile
+by writing to /proc/self/attr/exec or /proc/self/attr/current. To minimize the
+attack surface, we only send the fd for /proc/self/attr/exec or
+/proc/self/attr/current to the attached process. To do this we introduce a
+little more IPC between the child and parent:
+
+	 * IPC mechanism: (X is receiver)
+	 *   initial process        intermediate          attached
+	 *        X           <---  send pid of
+	 *                          attached proc,
+	 *                          then exit
+	 *    send 0 ------------------------------------>    X
+	 *                                              [do initialization]
+	 *        X  <------------------------------------  send 1
+	 *   [add to cgroup, ...]
+	 *    send 2 ------------------------------------>    X
+	 *						[set LXC_ATTACH_NO_NEW_PRIVS]
+	 *        X  <------------------------------------  send 3
+	 *   [open LSM label fd]
+	 *    send 4 ------------------------------------>    X
+	 *   						[set LSM label]
+	 *   close socket                                 close socket
+	 *                                                run program
+
+The attached child tells the parent when it is ready to have its LSM labels set
+up. The parent then opens an approriate fd for the child PID to
+/proc/<pid>/attr/exec or /proc/<pid>/attr/current and sends it via SCM_RIGHTS
+to the child. The child can then set its LSM laben. Both sides then close the
+socket fds and the child execs the requested process.
+
+Signed-off-by: Christian Brauner <christian.brauner@canonical.com>
+---
+ src/lxc/attach.c | 215 ++++++++++++++++++++++++++++++++++++++-----------------
+ 1 file changed, 149 insertions(+), 66 deletions(-)
+
+diff --git a/src/lxc/attach.c b/src/lxc/attach.c
+index 13989e8..4fc39c6 100644
+--- a/src/lxc/attach.c
++++ b/src/lxc/attach.c
+@@ -22,41 +22,43 @@
+  */
+ 
+ #define _GNU_SOURCE
+-#include <unistd.h>
+-#include <stdio.h>
+-#include <string.h>
+-#include <stdlib.h>
+-#include <signal.h>
+ #include <errno.h>
+ #include <fcntl.h>
+ #include <grp.h>
++#include <pwd.h>
++#include <signal.h>
++#include <stdio.h>
++#include <stdlib.h>
++#include <string.h>
++#include <unistd.h>
++#include <linux/unistd.h>
++#include <sys/mount.h>
+ #include <sys/param.h>
+ #include <sys/prctl.h>
+-#include <sys/mount.h>
+ #include <sys/socket.h>
+ #include <sys/syscall.h>
+ #include <sys/wait.h>
+-#include <linux/unistd.h>
+-#include <pwd.h>
+ 
+ #if !HAVE_DECL_PR_CAPBSET_DROP
+ #define PR_CAPBSET_DROP 24
+ #endif
+ 
+-#include "namespace.h"
+-#include "log.h"
++#include "af_unix.h"
+ #include "attach.h"
+ #include "caps.h"
+-#include "config.h"
+-#include "utils.h"
+-#include "commands.h"
+ #include "cgroup.h"
+-#include "lxclock.h"
++#include "commands.h"
+ #include "conf.h"
++#include "config.h"
++#include "confile.h"
++#include "log.h"
++#include "lxclock.h"
+ #include "lxcseccomp.h"
+-#include <lxc/lxccontainer.h>
++#include "namespace.h"
++#include "utils.h"
+ #include "lsm/lsm.h"
+-#include "confile.h"
++
++#include <lxc/lxccontainer.h>
+ 
+ #if HAVE_SYS_PERSONALITY_H
+ #include <sys/personality.h>
+@@ -76,80 +78,103 @@
+ 
+ lxc_log_define(lxc_attach, lxc);
+ 
+-int lsm_set_label_at(int procfd, int on_exec, char* lsm_label) {
++static int lsm_openat(int procfd, pid_t pid, int on_exec)
++{
++	int ret = -1;
+ 	int labelfd = -1;
+-	int ret = 0;
+ 	const char* name;
+-	char* command = NULL;
++#define __LSMATTRLEN /* /proc */ (5 + /* /pid-to-str */ 21 + /* /current */ 7 + /* \0 */ 1)
++	char path[__LSMATTRLEN];
+ 
+ 	name = lsm_name();
+ 
+ 	if (strcmp(name, "nop") == 0)
+-		goto out;
++		return 0;
+ 
+ 	if (strcmp(name, "none") == 0)
+-		goto out;
++		return 0;
+ 
+ 	/* We don't support on-exec with AppArmor */
+ 	if (strcmp(name, "AppArmor") == 0)
+ 		on_exec = 0;
+ 
+ 	if (on_exec) {
+-		labelfd = openat(procfd, "self/attr/exec", O_RDWR);
+-	}
+-	else {
+-		labelfd = openat(procfd, "self/attr/current", O_RDWR);
++		ret = snprintf(path, __LSMATTRLEN, "%d/attr/exec", pid);
++		if (ret < 0 || ret >= __LSMATTRLEN)
++			return -1;
++		labelfd = openat(procfd, path, O_RDWR);
++	} else {
++		ret = snprintf(path, __LSMATTRLEN, "%d/attr/current", pid);
++		if (ret < 0 || ret >= __LSMATTRLEN)
++			return -1;
++		labelfd = openat(procfd, path, O_RDWR);
+ 	}
+ 
+ 	if (labelfd < 0) {
+ 		SYSERROR("Unable to open LSM label");
+-		ret = -1;
+-		goto out;
++		return -1;
+ 	}
+ 
++	return labelfd;
++}
++
++static int lsm_set_label_at(int lsm_labelfd, int on_exec, char *lsm_label)
++{
++	int fret = -1;
++	const char* name;
++	char *command = NULL;
++
++	name = lsm_name();
++
++	if (strcmp(name, "nop") == 0)
++		return 0;
++
++	if (strcmp(name, "none") == 0)
++		return 0;
++
++	/* We don't support on-exec with AppArmor */
++	if (strcmp(name, "AppArmor") == 0)
++		on_exec = 0;
++
+ 	if (strcmp(name, "AppArmor") == 0) {
+ 		int size;
+ 
+ 		command = malloc(strlen(lsm_label) + strlen("changeprofile ") + 1);
+ 		if (!command) {
+ 			SYSERROR("Failed to write apparmor profile");
+-			ret = -1;
+ 			goto out;
+ 		}
+ 
+ 		size = sprintf(command, "changeprofile %s", lsm_label);
+ 		if (size < 0) {
+ 			SYSERROR("Failed to write apparmor profile");
+-			ret = -1;
+ 			goto out;
+ 		}
+ 
+-		if (write(labelfd, command, size + 1) < 0) {
+-			SYSERROR("Unable to set LSM label");
+-			ret = -1;
++		if (write(lsm_labelfd, command, size + 1) < 0) {
++			SYSERROR("Unable to set LSM label: %s.", command);
+ 			goto out;
+ 		}
+-	}
+-	else if (strcmp(name, "SELinux") == 0) {
+-		if (write(labelfd, lsm_label, strlen(lsm_label) + 1) < 0) {
++		INFO("Set LSM label to: %s.", command);
++	} else if (strcmp(name, "SELinux") == 0) {
++		if (write(lsm_labelfd, lsm_label, strlen(lsm_label) + 1) < 0) {
+ 			SYSERROR("Unable to set LSM label");
+-			ret = -1;
+ 			goto out;
+ 		}
+-	}
+-	else {
++		INFO("Set LSM label to: %s.", lsm_label);
++	} else {
+ 		ERROR("Unable to restore label for unknown LSM: %s", name);
+-		ret = -1;
+ 		goto out;
+ 	}
++	fret = 0;
+ 
+ out:
+ 	free(command);
+ 
+-	if (labelfd != -1)
+-		close(labelfd);
++	if (lsm_labelfd != -1)
++		close(lsm_labelfd);
+ 
+-	return ret;
++	return fret;
+ }
+ 
+ static struct lxc_proc_context_info *lxc_proc_get_context_info(pid_t pid)
+@@ -646,7 +671,6 @@ struct attach_clone_payload {
+ 	struct lxc_proc_context_info* init_ctx;
+ 	lxc_attach_exec_t exec_function;
+ 	void* exec_payload;
+-	int procfd;
+ };
+ 
+ static int attach_child_main(void* data);
+@@ -718,7 +742,6 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 	char* cwd;
+ 	char* new_cwd;
+ 	int ipc_sockets[2];
+-	int procfd;
+ 	signed long personality;
+ 
+ 	if (!options)
+@@ -788,9 +811,15 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 	 *        X  <------------------------------------  send 1
+ 	 *   [add to cgroup, ...]
+ 	 *    send 2 ------------------------------------>    X
++	 *						[set LXC_ATTACH_NO_NEW_PRIVS]
++	 *        X  <------------------------------------  send 3
++	 *   [open LSM label fd]
++	 *    send 4 ------------------------------------>    X
++	 *   						[set LSM label]
+ 	 *   close socket                                 close socket
+ 	 *                                                run program
+ 	 */
++
+ 	ret = socketpair(PF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0, ipc_sockets);
+ 	if (ret < 0) {
+ 		SYSERROR("could not set up required IPC mechanism for attaching");
+@@ -821,6 +850,7 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 	}
+ 
+ 	if (pid) {
++		int procfd = -1;
+ 		pid_t to_cleanup_pid = pid;
+ 
+ 		/* inital thread, we close the socket that is for the
+@@ -835,6 +865,15 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 				goto cleanup_error;
+ 		}
+ 
++		/* Open /proc before setns() to the containers namespace so we
++		 * don't rely on any information from inside the container.
++		 */
++		procfd = open("/proc", O_DIRECTORY | O_RDONLY | O_CLOEXEC);
++		if (procfd < 0) {
++			SYSERROR("Unable to open /proc.");
++			goto cleanup_error;
++		}
++
+ 		/* Let the child process know to go ahead */
+ 		status = 0;
+ 		ret = lxc_write_nointr(ipc_sockets[0], &status, sizeof(status));
+@@ -847,7 +886,8 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 		ret = lxc_read_nointr_expect(ipc_sockets[0], &attached_pid, sizeof(attached_pid), NULL);
+ 		if (ret <= 0) {
+ 			if (ret != 0)
+-				ERROR("error using IPC to receive pid of attached process");
++				ERROR("error using IPC to receive notification "
++				      "from attached process (1)");
+ 			goto cleanup_error;
+ 		}
+ 
+@@ -886,10 +926,40 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 		status = 2;
+ 		ret = lxc_write_nointr(ipc_sockets[0], &status, sizeof(status));
+ 		if (ret <= 0) {
+-			ERROR("error using IPC to notify attached process for initialization (2)");
++			ERROR("Error using IPC to notify attached process for "
++			      "initialization (2): %s.", strerror(errno));
+ 			goto cleanup_error;
+ 		}
+ 
++		/* Wait for the (grand)child to tell us that it's ready to set
++		 * up its LSM labels.
++		 */
++		expected = 3;
++		ret = lxc_read_nointr_expect(ipc_sockets[0], &status, sizeof(status), &expected);
++		if (ret <= 0) {
++			ERROR("Error using IPC for the child to tell us to open LSM fd (3): %s.",
++					strerror(errno));
++			goto cleanup_error;
++		}
++
++		/* Open LSM fd and send it to child. */
++		if ((options->namespaces & CLONE_NEWNS) && (options->attach_flags & LXC_ATTACH_LSM) && init_ctx->lsm_label) {
++			int on_exec, labelfd;
++			on_exec = options->attach_flags & LXC_ATTACH_LSM_EXEC ? 1 : 0;
++			/* Open fd for the LSM security module. */
++			labelfd = lsm_openat(procfd, attached_pid, on_exec);
++			if (labelfd < 0)
++				goto cleanup_error;
++
++			/* Send child fd of the LSM security module to write to. */
++			ret = lxc_abstract_unix_send_fd(ipc_sockets[0], labelfd, NULL, 0);
++			if (ret <= 0) {
++				ERROR("Error using IPC to send child LSM fd (4): %s.",
++						strerror(errno));
++				goto cleanup_error;
++			}
++		}
++
+ 		/* now shut down communication with child, we're done */
+ 		shutdown(ipc_sockets[0], SHUT_RDWR);
+ 		close(ipc_sockets[0]);
+@@ -907,6 +977,8 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 		/* first shut down the socket, then wait for the pid,
+ 		 * otherwise the pid we're waiting for may never exit
+ 		 */
++		if (procfd >= 0)
++			close(procfd);
+ 		shutdown(ipc_sockets[0], SHUT_RDWR);
+ 		close(ipc_sockets[0]);
+ 		if (to_cleanup_pid)
+@@ -930,13 +1002,6 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 		rexit(-1);
+ 	}
+ 
+-	procfd = open("/proc", O_DIRECTORY | O_RDONLY);
+-	if (procfd < 0) {
+-		SYSERROR("Unable to open /proc");
+-		shutdown(ipc_sockets[1], SHUT_RDWR);
+-		rexit(-1);
+-	}
+-
+ 	/* attach now, create another subprocess later, since pid namespaces
+ 	 * only really affect the children of the current process
+ 	 */
+@@ -964,8 +1029,7 @@ int lxc_attach(const char* name, const char* lxcpath, lxc_attach_exec_t exec_fun
+ 			.options = options,
+ 			.init_ctx = init_ctx,
+ 			.exec_function = exec_function,
+-			.exec_payload = exec_payload,
+-			.procfd = procfd
++			.exec_payload = exec_payload
+ 		};
+ 		/* We use clone_parent here to make this subprocess a direct child of
+ 		 * the initial process. Then this intermediate process can exit and
+@@ -1003,7 +1067,6 @@ static int attach_child_main(void* data)
+ {
+ 	struct attach_clone_payload* payload = (struct attach_clone_payload*)data;
+ 	int ipc_socket = payload->ipc_socket;
+-	int procfd = payload->procfd;
+ 	lxc_attach_options_t* options = payload->options;
+ 	struct lxc_proc_context_info* init_ctx = payload->init_ctx;
+ #if HAVE_SYS_PERSONALITY_H
+@@ -1014,6 +1077,7 @@ static int attach_child_main(void* data)
+ 	int expected;
+ 	long flags;
+ 	int fd;
++	int lsm_labelfd;
+ 	uid_t new_uid;
+ 	gid_t new_gid;
+ 
+@@ -1024,7 +1088,7 @@ static int attach_child_main(void* data)
+ 	status = -1;
+ 	ret = lxc_read_nointr_expect(ipc_socket, &status, sizeof(status), &expected);
+ 	if (ret <= 0) {
+-		ERROR("error using IPC to receive notification from initial process (0)");
++		ERROR("Error using IPC to receive notification from initial process (0): %s.", strerror(errno));
+ 		shutdown(ipc_socket, SHUT_RDWR);
+ 		rexit(-1);
+ 	}
+@@ -1123,7 +1187,7 @@ static int attach_child_main(void* data)
+ 	status = 1;
+ 	ret = lxc_write_nointr(ipc_socket, &status, sizeof(status));
+ 	if (ret != sizeof(status)) {
+-		ERROR("error using IPC to notify initial process for initialization (1)");
++		ERROR("Error using IPC to notify initial process for initialization (1): %s.", strerror(errno));
+ 		shutdown(ipc_socket, SHUT_RDWR);
+ 		rexit(-1);
+ 	}
+@@ -1135,30 +1199,52 @@ static int attach_child_main(void* data)
+ 	status = -1;
+ 	ret = lxc_read_nointr_expect(ipc_socket, &status, sizeof(status), &expected);
+ 	if (ret <= 0) {
+-		ERROR("error using IPC to receive final notification from initial process (2)");
++		ERROR("Error using IPC to receive message from initial process "
++		      "that it is done pre-initializing (2): %s",
++		      strerror(errno));
+ 		shutdown(ipc_socket, SHUT_RDWR);
+ 		rexit(-1);
+ 	}
+ 
+-	shutdown(ipc_socket, SHUT_RDWR);
+-	close(ipc_socket);
++	/* Tell the (grand)parent to send us LSM label fd. */
++	status = 3;
++	ret = lxc_write_nointr(ipc_socket, &status, sizeof(status));
++	if (ret <= 0) {
++		ERROR("Error using IPC to tell parent to set up LSM labels (3): %s.", strerror(errno));
++		shutdown(ipc_socket, SHUT_RDWR);
++		rexit(-1);
++	}
+ 
+-	/* set new apparmor profile/selinux context */
+ 	if ((options->namespaces & CLONE_NEWNS) && (options->attach_flags & LXC_ATTACH_LSM) && init_ctx->lsm_label) {
+ 		int on_exec;
++		/* Receive fd for LSM security module. */
++		ret = lxc_abstract_unix_recv_fd(ipc_socket, &lsm_labelfd, NULL, 0);
++		if (ret <= 0) {
++			ERROR("Error using IPC for parent to tell us LSM label fd (4): %s.", strerror(errno));
++			shutdown(ipc_socket, SHUT_RDWR);
++			rexit(-1);
++		}
+ 
++		/* Change into our new LSM profile. */
+ 		on_exec = options->attach_flags & LXC_ATTACH_LSM_EXEC ? 1 : 0;
+-		if (lsm_set_label_at(procfd, on_exec, init_ctx->lsm_label) < 0) {
++		if (lsm_set_label_at(lsm_labelfd, on_exec, init_ctx->lsm_label) < 0) {
++			SYSERROR("Failed to set LSM label.");
++			shutdown(ipc_socket, SHUT_RDWR);
++			close(lsm_labelfd);
+ 			rexit(-1);
+ 		}
++		close(lsm_labelfd);
+ 	}
+ 
+ 	if (init_ctx->container && init_ctx->container->lxc_conf &&
+ 			lxc_seccomp_load(init_ctx->container->lxc_conf) != 0) {
+ 		ERROR("Loading seccomp policy");
++		shutdown(ipc_socket, SHUT_RDWR);
+ 		rexit(-1);
+ 	}
+ 
++	shutdown(ipc_socket, SHUT_RDWR);
++	close(ipc_socket);
+ 	lxc_proc_put_context_info(init_ctx);
+ 
+ 	/* The following is done after the communication socket is
+@@ -1199,9 +1285,6 @@ static int attach_child_main(void* data)
+ 		}
+ 	}
+ 
+-	/* we don't need proc anymore */
+-	close(procfd);
+-
+ 	/* we're done, so we can now do whatever the user intended us to do */
+ 	rexit(payload->exec_function(payload->exec_payload));
+ }
diff --git a/debian/patches/series b/debian/patches/series
index f0fbe86..c97b6c5 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -23,3 +23,4 @@
 0023-lxc-debian-make-sure-init-is-installed.patch
 0024-lxc-alpine-fix-verification-of-apk.static-binary.patch
 0025-Remounts-bind-mounts-if-read-only-flag-is-provided.patch
+0026-CVE-2016-8649_do-not-send-procfd-to-attached-process.patch

--- End Message ---
--- Begin Message ---
Version: 8.7

Hi,

Each of these bugs refers to an update that was included in today's 8.7
point release.

Regards,

Adam

--- End Message ---

Reply to: