Files
linux/kernel
Eric W. Biederman 83b9d2dc51 unshare: Unsharing a thread does not require unsharing a vm
commit 12c641ab82 upstream.

In the logic in the initial commit of unshare made creating a new
thread group for a process, contingent upon creating a new memory
address space for that process.  That is wrong.  Two separate
processes in different thread groups can share a memory address space
and clone allows creation of such proceses.

This is significant because it was observed that mm_users > 1 does not
mean that a process is multi-threaded, as reading /proc/PID/maps
temporarily increments mm_users, which allows other processes to
(accidentally) interfere with unshare() calls.

Correct the check in check_unshare_flags() to test for
!thread_group_empty() for CLONE_THREAD, CLONE_SIGHAND, and CLONE_VM.
For sighand->count > 1 for CLONE_SIGHAND and CLONE_VM.
For !current_is_single_threaded instead of mm_users > 1 for CLONE_VM.

By using the correct checks in unshare this removes the possibility of
an accidental denial of service attack.

Additionally using the correct checks in unshare ensures that only an
explicit unshare(CLONE_VM) can possibly trigger the slow path of
current_is_single_threaded().  As an explict unshare(CLONE_VM) is
pointless it is not expected there are many applications that make
that call.

Fixes: b2e0d98705 userns: Implement unshare of the user namespace
Reported-by: Ricky Zhou <rickyz@chromium.org>
Reported-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2015-10-01 11:36:09 +02:00
..
2013-11-13 12:09:34 +09:00
2014-06-30 20:11:58 -07:00
2014-11-21 09:23:01 -08:00
2012-05-31 17:49:27 -07:00
2012-03-28 18:30:03 +01:00
2014-10-05 14:52:20 -07:00
2013-11-26 12:12:26 +01:00
2013-12-04 14:09:46 +10:30
2013-12-18 19:04:50 -08:00
2013-09-11 15:58:27 -07:00
2014-06-07 10:28:09 -07:00