unix: properly account for FDs passed over unix sockets
authorwilly tarreau <w@1wt.eu>
Sun, 10 Jan 2016 06:54:56 +0000 (07:54 +0100)
committerSasha Levin <sasha.levin@oracle.com>
Mon, 15 Feb 2016 20:42:43 +0000 (15:42 -0500)
commita5b9e44af8d3edaf49d14a91cc519a9fba439e67
tree2a2fcf2b9b356cee99e53c5b317c20154756c34f
parent9776b3e2f1e6fc0afcdcfe70ee14fb1b8dd03dff
unix: properly account for FDs passed over unix sockets

[ Upstream commit 712f4aad406bb1ed67f3f98d04c044191f0ff593 ]

It is possible for a process to allocate and accumulate far more FDs than
the process' limit by sending them over a unix socket then closing them
to keep the process' fd count low.

This change addresses this problem by keeping track of the number of FDs
in flight per user and preventing non-privileged processes from having
more FDs in flight than their configured FD limit.

Reported-by: socketpair@gmail.com
Reported-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Mitigates: CVE-2013-4312 (Linux 2.0+)
Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: Willy Tarreau <w@1wt.eu>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
include/linux/sched.h
net/unix/af_unix.c
net/unix/garbage.c