Bug 1221559 (CVE-2021-47128) - VUL-0: CVE-2021-47128: kernel: bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks
Summary: VUL-0: CVE-2021-47128: kernel: bpf, lockdown, audit: Fix buggy SELinux lockdo...
Status: RESOLVED FIXED
Alias: CVE-2021-47128
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/397862/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-47128:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-18 09:10 UTC by SMASH SMASH
Modified: 2024-04-19 09:27 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-03-18 09:10:59 UTC
In the Linux kernel, the following vulnerability has been resolved:

bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks

Commit 59438b46471a ("security,lockdown,selinux: implement SELinux lockdown")
added an implementation of the locked_down LSM hook to SELinux, with the aim
to restrict which domains are allowed to perform operations that would breach
lockdown. This is indirectly also getting audit subsystem involved to report
events. The latter is problematic, as reported by Ondrej and Serhei, since it
can bring down the whole system via audit:

  1) The audit events that are triggered due to calls to security_locked_down()
     can OOM kill a machine, see below details [0].

  2) It also seems to be causing a deadlock via avc_has_perm()/slow_avc_audit()
     when trying to wake up kauditd, for example, when using trace_sched_switch()
     tracepoint, see details in [1]. Triggering this was not via some hypothetical
     corner case, but with existing tools like runqlat & runqslower from bcc, for
     example, which make use of this tracepoint. Rough call sequence goes like:

     rq_lock(rq) -> -------------------------+
       trace_sched_switch() ->               |
         bpf_prog_xyz() ->                   +-> deadlock
           selinux_lockdown() ->             |
             audit_log_end() ->              |
               wake_up_interruptible() ->    |
                 try_to_wake_up() ->         |
                   rq_lock(rq) --------------+

What's worse is that the intention of 59438b46471a to further restrict lockdown
settings for specific applications in respect to the global lockdown policy is
completely broken for BPF. The SELinux policy rule for the current lockdown check
looks something like this:

  allow <who> <who> : lockdown { <reason> };

However, this doesn't match with the 'current' task where the security_locked_down()
is executed, example: httpd does a syscall. There is a tracing program attached
to the syscall which triggers a BPF program to run, which ends up doing a
bpf_probe_read_kernel{,_str}() helper call. The selinux_lockdown() hook does
the permission check against 'current', that is, httpd in this example. httpd
has literally zero relation to this tracing program, and it would be nonsensical
having to write an SELinux policy rule against httpd to let the tracing helper
pass. The policy in this case needs to be against the entity that is installing
the BPF program. For example, if bpftrace would generate a histogram of syscall
counts by user space application:

  bpftrace -e 'tracepoint:raw_syscalls:sys_enter { @[comm] = count(); }'

bpftrace would then go and generate a BPF program from this internally. One way
of doing it [for the sake of the example] could be to call bpf_get_current_task()
helper and then access current->comm via one of bpf_probe_read_kernel{,_str}()
helpers. So the program itself has nothing to do with httpd or any other random
app doing a syscall here. The BPF program _explicitly initiated_ the lockdown
check. The allow/deny policy belongs in the context of bpftrace: meaning, you
want to grant bpftrace access to use these helpers, but other tracers on the
system like my_random_tracer _not_.

Therefore fix all three issues at the same time by taking a completely different
approach for the security_locked_down() hook, that is, move the check into the
program verification phase where we actually retrieve the BPF func proto. This
also reliably gets the task (current) that is trying to install the BPF tracing
program, e.g. bpftrace/bcc/perf/systemtap/etc, and it also fixes the OOM since
we're moving this out of the BPF helper's fast-path which can be called several
millions of times per second.

The check is then also in line with other security_locked_down() hooks in the
system where the enforcement is performed at open/load time, for example,
open_kcore() for /proc/kcore access or module_sig_check() for module signatures
just to pick f
---truncated---

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-47128
https://www.cve.org/CVERecord?id=CVE-2021-47128
https://git.kernel.org/stable/c/acc43fc6cf0d50612193813c5906a1ab9d433e1e
https://git.kernel.org/stable/c/ff40e51043af63715ab413995ff46996ecf9583f
https://git.kernel.org/stable/c/ff5039ec75c83d2ed5b781dc7733420ee8c985fc
https://bugzilla.redhat.com/show_bug.cgi?id=2269831
Comment 1 Gabriele Sonnu 2024-03-18 09:24:00 UTC
Offending commit (59438b46471a) found in:
 - ALP-current
 - cve/linux-5.14
 - SLE15-SP4-LTSS
 - SLE15-SP5
 - SLE15-SP6
 - stable

Fixing commit (acc43fc6cf0d) found in:
 - ALP-current
 - cve/linux-5.14
 - SLE15-SP4-LTSS
 - SLE15-SP5
 - SLE15-SP6
 - stable

All branches fixed, @kernel-team please add the reference.
Comment 3 Shung-Hsi Yu 2024-03-19 05:01:38 UTC
No reference updated needed in this case.

Buggy commit is introduced in v5.6 and the fix landed in v5.13. None of our pre-v5.13 branches backported commit 59438b46471a ("security,lockdown,selinux: implement SELinux lockdown"), and all the v5.13+ branches already inherit the fix from the source they're based on.

Reassigning back to security team.
Comment 4 Gabriele Sonnu 2024-04-19 09:27:25 UTC
All done, closing.