netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* user controllable usermodehelper in br_stp_if.c
@ 2015-11-29 22:43 Richard Weinberger
  2015-11-30 20:14 ` Kees Cook
  0 siblings, 1 reply; 10+ messages in thread
From: Richard Weinberger @ 2015-11-29 22:43 UTC (permalink / raw)
  To: netdev@vger.kernel.org
  Cc: bridge, linux-kernel@vger.kernel.org, keescook@chromium.org,
	kernel-hardening@lists.openwall.com

Hi!

By spawning new network and user namesapces an unprivileged user
is able to execute /sbin/bridge-stp within the initial mount namespace
with global root rights.
While this cannot directly be used to break out of a container or gain
global root rights it could be used by exploit writers as valuable building block.

e.g.
$ unshare -U -r -n /bin/sh
$ brctl addbr br0
$ brctl stp br0 on # this will execute /sbin/bridge-stp

As this mechanism clearly cannot work with containers and seems to be legacy code
I suggest not calling call_usermodehelper() at all if we're not in the initial user namespace.
What do you think?

Thanks,
//richard

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: user controllable usermodehelper in br_stp_if.c
  2015-11-29 22:43 user controllable usermodehelper in br_stp_if.c Richard Weinberger
@ 2015-11-30 20:14 ` Kees Cook
  2015-11-30 21:38   ` [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace Eric W. Biederman
  2015-11-30 23:03   ` user controllable usermodehelper in br_stp_if.c Richard Weinberger
  0 siblings, 2 replies; 10+ messages in thread
From: Kees Cook @ 2015-11-30 20:14 UTC (permalink / raw)
  To: Richard Weinberger, Eric W. Biederman
  Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org,
	kernel-hardening@lists.openwall.com, bridge, Stephen Hemminger

On Sun, Nov 29, 2015 at 2:43 PM, Richard Weinberger <richard@nod.at> wrote:
> Hi!
>
> By spawning new network and user namesapces an unprivileged user
> is able to execute /sbin/bridge-stp within the initial mount namespace
> with global root rights.
> While this cannot directly be used to break out of a container or gain
> global root rights it could be used by exploit writers as valuable building block.
>
> e.g.
> $ unshare -U -r -n /bin/sh
> $ brctl addbr br0
> $ brctl stp br0 on # this will execute /sbin/bridge-stp
>
> As this mechanism clearly cannot work with containers and seems to be legacy code
> I suggest not calling call_usermodehelper() at all if we're not in the initial user namespace.
> What do you think?

I'm not familiar with how bridge-stp is expected to operate with a
network namespace, but if it's meaningless, then yeah, that seems like
a reasonable change. Can you send a patch? (Also, if it's legacy code,
maybe it could be turned off entirely, not just for containers?)

-Kees

-- 
Kees Cook
Chrome OS & Brillo Security

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace
  2015-11-30 20:14 ` Kees Cook
@ 2015-11-30 21:38   ` Eric W. Biederman
  2015-11-30 22:12     ` Stephen Hemminger
                       ` (3 more replies)
  2015-11-30 23:03   ` user controllable usermodehelper in br_stp_if.c Richard Weinberger
  1 sibling, 4 replies; 10+ messages in thread
From: Eric W. Biederman @ 2015-11-30 21:38 UTC (permalink / raw)
  To: David Miller
  Cc: Kees Cook, kernel-hardening@lists.openwall.com,
	Richard Weinberger, bridge, linux-kernel@vger.kernel.org,
	netdev@vger.kernel.org


There is no defined mechanism to pass network namespace information
into /sbin/bridge-stp therefore don't even try to invoke it except
for bridge devices in the initial network namespace.

It is possible for unprivileged users to cause /sbin/bridge-stp to be
invoked for any network device name which if /sbin/bridge-stp does not
guard against unreasonable arguments or being invoked twice on the same
network device could cause problems.

Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
---
 net/bridge/br_stp_if.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c
index 5396ff08af32..742fa89528ab 100644
--- a/net/bridge/br_stp_if.c
+++ b/net/bridge/br_stp_if.c
@@ -142,7 +142,9 @@ static void br_stp_start(struct net_bridge *br)
 	char *envp[] = { NULL };
 	struct net_bridge_port *p;
 
-	r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC);
+	r = -ENOENT;
+	if (dev_net(br->dev) == &init_net)
+		r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC);
 
 	spin_lock_bh(&br->lock);
 
-- 
2.2.1

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* Re: [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace
  2015-11-30 21:38   ` [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace Eric W. Biederman
@ 2015-11-30 22:12     ` Stephen Hemminger
  2015-11-30 22:16       ` Eric W. Biederman
  2015-11-30 22:57     ` Richard Weinberger
                       ` (2 subsequent siblings)
  3 siblings, 1 reply; 10+ messages in thread
From: Stephen Hemminger @ 2015-11-30 22:12 UTC (permalink / raw)
  To: Eric W. Biederman
  Cc: Kees Cook, kernel-hardening@lists.openwall.com,
	Richard Weinberger, bridge, linux-kernel@vger.kernel.org,
	netdev@vger.kernel.org, David Miller

On Mon, 30 Nov 2015 15:38:15 -0600
ebiederm@xmission.com (Eric W. Biederman) wrote:

> 
> There is no defined mechanism to pass network namespace information
> into /sbin/bridge-stp therefore don't even try to invoke it except
> for bridge devices in the initial network namespace.
> 
> It is possible for unprivileged users to cause /sbin/bridge-stp to be
> invoked for any network device name which if /sbin/bridge-stp does not
> guard against unreasonable arguments or being invoked twice on the same
> network device could cause problems.
> 
> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
> ---
>  net/bridge/br_stp_if.c | 4 +++-
>  1 file changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c
> index 5396ff08af32..742fa89528ab 100644
> --- a/net/bridge/br_stp_if.c
> +++ b/net/bridge/br_stp_if.c
> @@ -142,7 +142,9 @@ static void br_stp_start(struct net_bridge *br)
>  	char *envp[] = { NULL };
>  	struct net_bridge_port *p;
>  
> -	r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC);
> +	r = -ENOENT;
> +	if (dev_net(br->dev) == &init_net)
> +		r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC);

I don't think this will cause loud screams.
But it might break people that use containers to run virtual networks for testing.

One coding nit:
Why are you afraid of using an else?

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace
  2015-11-30 22:12     ` Stephen Hemminger
@ 2015-11-30 22:16       ` Eric W. Biederman
  0 siblings, 0 replies; 10+ messages in thread
From: Eric W. Biederman @ 2015-11-30 22:16 UTC (permalink / raw)
  To: Stephen Hemminger
  Cc: Kees Cook, kernel-hardening@lists.openwall.com,
	Richard Weinberger, bridge, linux-kernel@vger.kernel.org,
	netdev@vger.kernel.org, David Miller

Stephen Hemminger <stephen@networkplumber.org> writes:

> On Mon, 30 Nov 2015 15:38:15 -0600
> ebiederm@xmission.com (Eric W. Biederman) wrote:
>
>> 
>> There is no defined mechanism to pass network namespace information
>> into /sbin/bridge-stp therefore don't even try to invoke it except
>> for bridge devices in the initial network namespace.
>> 
>> It is possible for unprivileged users to cause /sbin/bridge-stp to be
>> invoked for any network device name which if /sbin/bridge-stp does not
>> guard against unreasonable arguments or being invoked twice on the same
>> network device could cause problems.
>> 
>> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
>> ---
>>  net/bridge/br_stp_if.c | 4 +++-
>>  1 file changed, 3 insertions(+), 1 deletion(-)
>> 
>> diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c
>> index 5396ff08af32..742fa89528ab 100644
>> --- a/net/bridge/br_stp_if.c
>> +++ b/net/bridge/br_stp_if.c
>> @@ -142,7 +142,9 @@ static void br_stp_start(struct net_bridge *br)
>>  	char *envp[] = { NULL };
>>  	struct net_bridge_port *p;
>>  
>> -	r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC);
>> +	r = -ENOENT;
>> +	if (dev_net(br->dev) == &init_net)
>> +		r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC);
>
> I don't think this will cause loud screams.
> But it might break people that use containers to run virtual networks
> for testing.

I don't see how this interface can possibly be for more than the initial
network namespace.  There is no network namespace information conveyed
and /sbin/bridge-stp always runs in the initial network namespace.

Which is the point of this patch.  Don't try when the code can not work.

The only way this code could possibly work in the presence of multiple
network namespaces is if somehow the network namespace was encoded in
the device name, and then the usermode helper switched to the
appropriate network namespace.

I suspect that anyone knowledgable enough to know this interface exists
would have sent a patch to fix the kernel to give network namespace
information rather than use a horrible userspace hack like encoding the
network namespace in the device name.

> One coding nit:
> Why are you afraid of using an else?

Branch stalls.  Plus in this case an else is more lines and just plain
uglier code.

Eric

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace
  2015-11-30 21:38   ` [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace Eric W. Biederman
  2015-11-30 22:12     ` Stephen Hemminger
@ 2015-11-30 22:57     ` Richard Weinberger
  2015-12-01 14:13     ` Hannes Frederic Sowa
  2015-12-03  4:50     ` David Miller
  3 siblings, 0 replies; 10+ messages in thread
From: Richard Weinberger @ 2015-11-30 22:57 UTC (permalink / raw)
  To: Eric W. Biederman, David Miller
  Cc: Kees Cook, kernel-hardening@lists.openwall.com,
	netdev@vger.kernel.org, bridge, linux-kernel@vger.kernel.org

Am 30.11.2015 um 22:38 schrieb Eric W. Biederman:
> 
> There is no defined mechanism to pass network namespace information
> into /sbin/bridge-stp therefore don't even try to invoke it except
> for bridge devices in the initial network namespace.
> 
> It is possible for unprivileged users to cause /sbin/bridge-stp to be
> invoked for any network device name which if /sbin/bridge-stp does not
> guard against unreasonable arguments or being invoked twice on the same
> network device could cause problems.
> 
> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>

Just figured that /sbin/bridge-stp is a shell script.
Network interfaces can contain a lot of funny characters,
maybe this is after all a security issue.

Thanks,
//richard

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: user controllable usermodehelper in br_stp_if.c
  2015-11-30 20:14 ` Kees Cook
  2015-11-30 21:38   ` [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace Eric W. Biederman
@ 2015-11-30 23:03   ` Richard Weinberger
  1 sibling, 0 replies; 10+ messages in thread
From: Richard Weinberger @ 2015-11-30 23:03 UTC (permalink / raw)
  To: Kees Cook, Eric W. Biederman
  Cc: kernel-hardening@lists.openwall.com, netdev@vger.kernel.org,
	bridge, linux-kernel@vger.kernel.org, shayan

Am 30.11.2015 um 21:14 schrieb Kees Cook:
> On Sun, Nov 29, 2015 at 2:43 PM, Richard Weinberger <richard@nod.at> wrote:
>> Hi!
>>
>> By spawning new network and user namesapces an unprivileged user
>> is able to execute /sbin/bridge-stp within the initial mount namespace
>> with global root rights.
>> While this cannot directly be used to break out of a container or gain
>> global root rights it could be used by exploit writers as valuable building block.
>>
>> e.g.
>> $ unshare -U -r -n /bin/sh
>> $ brctl addbr br0
>> $ brctl stp br0 on # this will execute /sbin/bridge-stp
>>
>> As this mechanism clearly cannot work with containers and seems to be legacy code
>> I suggest not calling call_usermodehelper() at all if we're not in the initial user namespace.
>> What do you think?
> 
> I'm not familiar with how bridge-stp is expected to operate with a
> network namespace, but if it's meaningless, then yeah, that seems like
> a reasonable change. Can you send a patch? (Also, if it's legacy code,
> maybe it could be turned off entirely, not just for containers?)

Eric was faster than me. :-)

BTW: kernel.core_pattern is also worth a look.
If the pipe mode is used, "|/bin/core_tool", it will be executed in the
initial namespace and any user/container can trigger it.
Shayan reported that some weeks ago: https://lkml.org/lkml/2015/10/24/134

Thanks,
//richard

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace
  2015-11-30 21:38   ` [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace Eric W. Biederman
  2015-11-30 22:12     ` Stephen Hemminger
  2015-11-30 22:57     ` Richard Weinberger
@ 2015-12-01 14:13     ` Hannes Frederic Sowa
  2015-12-03  4:50     ` David Miller
  3 siblings, 0 replies; 10+ messages in thread
From: Hannes Frederic Sowa @ 2015-12-01 14:13 UTC (permalink / raw)
  To: Eric W. Biederman, David Miller
  Cc: Richard Weinberger, netdev, linux-kernel, kernel-hardening,
	bridge, Stephen Hemminger, Kees Cook

On Mon, Nov 30, 2015, at 22:38, Eric W. Biederman wrote:
> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
> ---
>  net/bridge/br_stp_if.c | 4 +++-
>  1 file changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c
> index 5396ff08af32..742fa89528ab 100644
> --- a/net/bridge/br_stp_if.c
> +++ b/net/bridge/br_stp_if.c
> @@ -142,7 +142,9 @@ static void br_stp_start(struct net_bridge *br)
>  	char *envp[] = { NULL };
>  	struct net_bridge_port *p;
>  
> -       r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC);
> +       r = -ENOENT;
> +       if (dev_net(br->dev) == &init_net)

net_eq ?

> +               r = call_usermodehelper(BR_STP_PROG, argv, envp,
> UMH_WAIT_PROC);
>  
>  	spin_lock_bh(&br->lock);
>  

Otherwise, ack, so far.

As our /sys interfaces directories are tagged by the net namespace it
would actually make sense to run bridge-stp automatically in another
name space.

Bye,
Hannes

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace
  2015-11-30 21:38   ` [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace Eric W. Biederman
                       ` (2 preceding siblings ...)
  2015-12-01 14:13     ` Hannes Frederic Sowa
@ 2015-12-03  4:50     ` David Miller
  2015-12-08 20:56       ` Kees Cook
  3 siblings, 1 reply; 10+ messages in thread
From: David Miller @ 2015-12-03  4:50 UTC (permalink / raw)
  To: ebiederm
  Cc: keescook, kernel-hardening, richard, bridge, linux-kernel, netdev

From: ebiederm@xmission.com (Eric W. Biederman)
Date: Mon, 30 Nov 2015 15:38:15 -0600

> +	if (dev_net(br->dev) == &init_net)

Please respin this using net_eq() as Hannes pointed out.

Thanks.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace
  2015-12-03  4:50     ` David Miller
@ 2015-12-08 20:56       ` Kees Cook
  0 siblings, 0 replies; 10+ messages in thread
From: Kees Cook @ 2015-12-08 20:56 UTC (permalink / raw)
  To: David Miller
  Cc: Eric W. Biederman, Richard Weinberger, Network Development, LKML,
	kernel-hardening@lists.openwall.com, bridge, Stephen Hemminger

On Wed, Dec 2, 2015 at 8:50 PM, David Miller <davem@davemloft.net> wrote:
> From: ebiederm@xmission.com (Eric W. Biederman)
> Date: Mon, 30 Nov 2015 15:38:15 -0600
>
>> +     if (dev_net(br->dev) == &init_net)
>
> Please respin this using net_eq() as Hannes pointed out.

Sorry if I missed it: this this happen yet?

-Kees

-- 
Kees Cook
Chrome OS & Brillo Security

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2015-12-08 20:56 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-11-29 22:43 user controllable usermodehelper in br_stp_if.c Richard Weinberger
2015-11-30 20:14 ` Kees Cook
2015-11-30 21:38   ` [PATCH net] bridge: Only call /sbin/bridge-stp for the initial network namespace Eric W. Biederman
2015-11-30 22:12     ` Stephen Hemminger
2015-11-30 22:16       ` Eric W. Biederman
2015-11-30 22:57     ` Richard Weinberger
2015-12-01 14:13     ` Hannes Frederic Sowa
2015-12-03  4:50     ` David Miller
2015-12-08 20:56       ` Kees Cook
2015-11-30 23:03   ` user controllable usermodehelper in br_stp_if.c Richard Weinberger

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).