From: Nicolas Bouchinet <nicolas.bouchinet@ssi.gouv.fr>
proc_dointvec converts a string to a vector of signed int, which is
stored in the unsigned int .data core_pipe_limit.
It was thus authorized to write a negative value to core_pipe_limit
sysctl which once stored in core_pipe_limit, leads to the signed int
dump_count check against core_pipe_limit never be true. The same can be
achieved with core_pipe_limit set to INT_MAX.
Any negative write or >= to INT_MAX in core_pipe_limit sysctl would
hypothetically allow a user to create very high load on the system by
running processes that produces a coredump in case the core_pattern
sysctl is configured to pipe core files to user space helper.
Memory or PID exhaustion should happen before but it anyway breaks the
core_pipe_limit semantic.
This commit fixes this by changing core_pipe_limit sysctl's proc_handler
to proc_dointvec_minmax and bound checking between SYSCTL_ZERO and
SYSCTL_INT_MAX.
Fixes: a293980c2e26 ("exec: let do_coredump() limit the number of concurrent dumps to pipes")
Signed-off-by: Nicolas Bouchinet <nicolas.bouchinet@ssi.gouv.fr>
Reviewed-by: Jan Kara <jack@suse.cz>
---
fs/coredump.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/fs/coredump.c b/fs/coredump.c
index d48edb37bc35c..9239636b8812a 100644
--- a/fs/coredump.c
+++ b/fs/coredump.c
@@ -1015,7 +1015,9 @@ static struct ctl_table coredump_sysctls[] = {
.data = &core_pipe_limit,
.maxlen = sizeof(unsigned int),
.mode = 0644,
- .proc_handler = proc_dointvec,
+ .proc_handler = proc_dointvec_minmax,
+ .extra1 = SYSCTL_ZERO,
+ .extra2 = SYSCTL_INT_MAX,
},
{
.procname = "core_file_note_size_limit",
--
2.48.1
On Wed, Jan 15, 2025 at 02:22:08PM +0100, nicolas.bouchinet@clip-os.org wrote: > Any negative write or >= to INT_MAX in core_pipe_limit sysctl would > hypothetically allow a user to create very high load on the system by > running processes that produces a coredump in case the core_pattern > sysctl is configured to pipe core files to user space helper. > Memory or PID exhaustion should happen before but it anyway breaks the > core_pipe_limit semantic. Isn't this true for "0" too (the default)? I'm not opposed to the change since it makes things more clear, but I don't think the >=INT_MAX problem is anything more than "functionally identical to 0". :) Reviewed-by: Kees Cook <kees@kernel.org> -- Kees Cook
On 1/16/25 1:32 AM, Kees Cook wrote: > On Wed, Jan 15, 2025 at 02:22:08PM +0100, nicolas.bouchinet@clip-os.org wrote: >> Any negative write or >= to INT_MAX in core_pipe_limit sysctl would >> hypothetically allow a user to create very high load on the system by >> running processes that produces a coredump in case the core_pattern >> sysctl is configured to pipe core files to user space helper. >> Memory or PID exhaustion should happen before but it anyway breaks the >> core_pipe_limit semantic. > Isn't this true for "0" too (the default)? I'm not opposed to the change > since it makes things more clear, but I don't think the >=INT_MAX > problem is anything more than "functionally identical to 0". :) Uhm, I think your right, its seems to be functionally identical. 0 codepath slightly differs from > 0 though since it won't trigger wait_for_dump_helpers(). Thanks for your review, Nicolas > > Reviewed-by: Kees Cook <kees@kernel.org> >
© 2016 - 2025 Red Hat, Inc.