Skip to content
Permalink
Browse files

Don't create our own temporary mount point for pivot_root

An attacker could pre-create /tmp/.bubblewrap-$UID and make it a
non-directory, non-symlink (in which case mounting our tmpfs would fail,
causing denial of service), or make it a symlink under their control
(potentially allowing bad things if the protected_symlinks sysctl is
not enabled).

Instead, temporarily mount the tmpfs on a directory that we are sure
exists and is not attacker-controlled. We already rely on /proc to have
those properties, so it seems as good a place as any. This doesn't appear
to have any impact on our ability to use /proc as either the source or
the destination of a bind-mount.

Fixes: projectatomic#304
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923557
Signed-off-by: Simon McVittie <smcv@debian.org>
  • Loading branch information...
smcv committed Mar 2, 2019
1 parent 94147e2 commit 1244dc85e7d278d766c663c82aea837e21108113
Showing with 8 additions and 10 deletions.
  1. +8 −10 bubblewrap.c
@@ -2046,7 +2046,7 @@ main (int argc,
char **argv)
{
mode_t old_umask;
cleanup_free char *base_path = NULL;
const char *base_path = NULL;
int clone_flags;
char *old_cwd = NULL;
pid_t pid;
@@ -2187,15 +2187,13 @@ main (int argc,
die_with_error ("Can't open /proc");

/* We need *some* mountpoint where we can mount the root tmpfs.
We first try in /run, and if that fails, try in /tmp. */
base_path = xasprintf ("/run/user/%d/.bubblewrap", real_uid);
if (ensure_dir (base_path, 0755))
{
free (base_path);
base_path = xasprintf ("/tmp/.bubblewrap-%d", real_uid);
if (ensure_dir (base_path, 0755))
die_with_error ("Creating root mountpoint failed");
}
* Because we use pivot_root, it won't appear to be mounted from
* the perspective of the sandboxed process, so we can use anywhere
* that is sure to exist, that is sure to not be a symlink controlled
* by someone malicious, and that we won't immediately need to
* access ourselves. We already (have to) trust /proc, so it seems
* as good a path as any. */
base_path = "/proc";

__debug__ (("creating new namespace\n"));

0 comments on commit 1244dc8

Please sign in to comment.
You can’t perform that action at this time.