Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20180201031937.GR1627@brightrain.aerifal.cx>
Date: Wed, 31 Jan 2018 22:19:37 -0500
From: Rich Felker <dalias@...c.org>
To: musl@...ts.openwall.com
Subject: Re: [PATCH] faccessat: fix error code on setreXid failure

On Wed, Jan 31, 2018 at 01:20:45AM +0300, Alexander Monakov wrote:
> On Tue, 30 Jan 2018, Rich Felker wrote:
> > > We know we are not tracing this child, and stop notifications are only
> > > delivered if WUNTRACED is given in flags, aren't they?
> > 
> > I'm not sure what can happen if it's all running under strace -f or
> > something. And I'm not sure what the conditions for stop notifications
> > are. If it's assured that they can't happen then maybe the loop can be
> > removed.
> 
> Well, currently musl is just inconsistent, as in other instance(s?)
> (most notably in posix_spawn) it makes a single call to waitpid
> without retrying even though the same concerns apply.

OK, reading the spec I think without WUNTRACED or WCONTINUED, waitpid
can only succeed if the child has terminated. So it's probably fine
not to loop as long as signals are blocked.

It's perhaps (probably?) also safe to use CLONE_VM for the same reason
as in posix_spawn: because we have all (including implementation
internal) signals blocked, set*id() cannot succeed while the child
exists and thus you can't get into a situation where the child is
sharing memory but has different credentials. (The attack I have in
mind here to defend against is that the child drops root then runs
user-provided code, and the user-provided code modifies the code
that's running in the other process with elevated privileges.)

Rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.