+ apply-security_syslog-only-to-the-syslog-syscall-not-to-proc-kmsg.patch added to -mm tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The patch titled
     apply security_syslog() only to the syslog() syscall, not to /proc/kmsg
has been added to the -mm tree.  Its filename is
     apply-security_syslog-only-to-the-syslog-syscall-not-to-proc-kmsg.patch

See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find
out what to do about this

------------------------------------------------------
Subject: apply security_syslog() only to the syslog() syscall, not to /proc/kmsg
From: "Zack Weinberg" <zackw@xxxxxxxxx>

Presently, the security checks for syslog(2) apply also to access to
/proc/kmsg, because /proc/kmsg's file_operations functions just call
do_syslog, and the call to security_syslog is in do_syslog, not sys_syslog.
 [The only callers of do_syslog are sys_syslog and
kmsg_{read,poll,open,release}.] This has the effect, with the default
security policy, that no matter what the file permissions on /proc/kmsg
are, only a process with CAP_SYS_ADMIN can actually open or read it.  [Yes,
if you open /proc/kmsg as root and then drop privileges, subsequent reads
on that fd fail.] In consequence, if one wishes to run klogd as an
unprivileged user, one is forced to jump through awkward hoops - for
example, Ubuntu's /etc/init.d/klogd interposes a root-privileged "dd"
process and a named pipe between /proc/kmsg and the actual klogd.

I propose to move the security_syslog() check from do_syslog to sys_syslog,
so that the syscall remains restricted to CAP_SYS_ADMIN in the default
policy, but /proc/kmsg is governed by its file permissions.  With the
attached patch, I can run klogd as an unprivileged user, having changed the
ownership of /proc/kmsg to that user before starting it, and it still
works.  Equally, I can leave the ownership alone but modify klogd to get
messages from stdin, start it with stdin open on /proc/kmsg (again
unprivileged) and it works.

I think this is safe in the default security policy - /proc/kmsg starts out
owned by root and mode 400 - but I am not sure of the impact on SELinux or
other alternate policy frameworks.

Signed-off-by: Zack Weinberg <zackw@xxxxxxxxx>
Cc: Chris Wright <chrisw@xxxxxxxxxxxx>
Cc: Stephen Smalley <sds@xxxxxxxxxxxxx>
Cc: James Morris <jmorris@xxxxxxxxx>
Signed-off-by: Andrew Morton <akpm@xxxxxxxx>
---

 kernel/printk.c |    8 ++++----
 1 files changed, 4 insertions(+), 4 deletions(-)

diff -puN kernel/printk.c~apply-security_syslog-only-to-the-syslog-syscall-not-to-proc-kmsg kernel/printk.c
--- a/kernel/printk.c~apply-security_syslog-only-to-the-syslog-syscall-not-to-proc-kmsg
+++ a/kernel/printk.c
@@ -187,10 +187,6 @@ int do_syslog(int type, char __user *buf
 	char c;
 	int error = 0;
 
-	error = security_syslog(type);
-	if (error)
-		return error;
-
 	switch (type) {
 	case 0:		/* Close log */
 		break;
@@ -317,6 +313,10 @@ out:
 
 asmlinkage long sys_syslog(int type, char __user *buf, int len)
 {
+	int error = security_syslog(type);
+	if (error)
+		return error;
+
 	return do_syslog(type, buf, len);
 }
 
_

Patches currently in -mm which might be from zackw@xxxxxxxxx are

apply-security_syslog-only-to-the-syslog-syscall-not-to-proc-kmsg.patch

-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel Newbies FAQ]     [Kernel Archive]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [Bugtraq]     [Photo]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]

  Powered by Linux