From 04c362b4dd130c1874ca7960d79f939d00f6a640 Mon Sep 17 00:00:00 2001 From: Andreas Kling Date: Thu, 18 Aug 2022 01:03:00 +0200 Subject: [PATCH] Kernel: Fix TOCTOU in sys$unveil() Make sure we reject the unveil attempt with EPERM if the veil was locked by another thread while we were parsing argument (and not holding the veil state spinlock.) Thanks Brian for spotting this! :^) Amendment to #14907. --- Kernel/Syscalls/unveil.cpp | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/Kernel/Syscalls/unveil.cpp b/Kernel/Syscalls/unveil.cpp index 699cbc8aa6..4ffb3cc73a 100644 --- a/Kernel/Syscalls/unveil.cpp +++ b/Kernel/Syscalls/unveil.cpp @@ -95,6 +95,11 @@ ErrorOr Process::sys$unveil(Userspace auto path_parts = KLexicalPath::parts(new_unveiled_path->view()); auto it = path_parts.begin(); return m_unveil_data.with([&](auto& unveil_data) -> ErrorOr { + // NOTE: We have to check again, since the veil may have been locked by another thread + // while we were parsing the arguments. + if (unveil_data.state == VeilState::Locked) + return EPERM; + auto& matching_node = unveil_data.paths.traverse_until_last_accessible_node(it, path_parts.end()); if (it.is_end()) { // If the path has already been explicitly unveiled, do not allow elevating its permissions.