Leaking Path in XFS's ioctl interface(missing LSM check)
Alan Cox
gnomes at lxorguk.ukuu.org.uk
Sun Sep 30 14:16:52 UTC 2018
> > CAP_SYS_ADMIN is also a bit weird because low level access usually
> > implies you can bypass access controls so you should also check
> > CAP_SYS_DAC ?
>
> Do you mean CAP_DAC_READ_SEARCH as per the newer handle syscalls?
> But that only allows bypassing directory search operations, so maybe
> you mean CAP_DAC_OVERRIDE?
It depends what the ioctl allows you to do. If it allows me to bypass
DAC and manipulate the file system to move objects around then it's a
serious issue.
The underlying problem is if CAP_SYS_ADMIN is able to move objects around
then I can move modules around. We already have a problem with
CAP_DAC_OVERRIDE giving you CAP_SYS_RAWIO (ie totally owning the machine)
unless the modules are signed, if xfs allows ADMIN as well then
CAP_SYS_ADMIN is much easier to obtain and you'd get total system
ownership from it.
Not good.
> Regardless, this horse bolted long before those syscalls were
> introduced. The time to address this issue was when XFS was merged
> into linux all those years ago, back when the apps that run in
> highly secure restricted environments that use these interfaces were
> being ported to linux. We can't change this now without breaking
> userspace....
That's what people said about setuid shell scripts.
I'd like to understand better what can be done. We can argue afterwards
about what if anything to do about it and if it is possible to abuse it.
Alan
More information about the Linux-security-module-archive
mailing list