| Summary: | Running any command that interacts with network connections as an underprivileged user panics the OS | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Base System | Reporter: | Shirkdog <mshirk> | ||||
| Component: | kern | Assignee: | Gleb Smirnoff <glebius> | ||||
| Status: | Closed FIXED | ||||||
| Severity: | Affects Some People | CC: | bz, emaste, glebius | ||||
| Priority: | --- | Keywords: | crash, security | ||||
| Version: | CURRENT | Flags: | koobs:
mfc-stable12-
koobs: mfc-stable11- |
||||
| Hardware: | amd64 | ||||||
| OS: | Any | ||||||
| Attachments: |
|
||||||
|
Description
Shirkdog
2019-12-04 04:02:48 UTC
I can also make it happen with "systat -netstat all" Does not happen on a release, so does not need to be private Shirkdog reports the 11/7 snapshot is fine, 11/14 panics. sysctl security.bsd.see_other_uids=0 is needed r354484: commit 6d3bde7c4ae5b57d4308170a83bdc2edf85ad332 Author: glebius <glebius@FreeBSD.org> Date: Thu Nov 7 21:27:32 2019 +0000 Now that there is no R/W lock on PCB list the pcblist sysctls handlers can be greatly simplified. All the previous double cycling and complex locking was added to avoid these functions holding global PCB locks for extended period of time, preventing addition of new entries. Notes: svn path=/head/; revision=354484 20:15 < Shirkdog> and security.bsd.see_other_gids=0 A commit references this bug: Author: glebius Date: Wed Dec 4 22:41:53 UTC 2019 New revision: 355405 URL: https://svnweb.freebsd.org/changeset/base/355405 Log: Fix regression from r354484. Don't leak pcb lock if cr_canseeinpcb() returns non-zero. PR: 242415 Changes: head/sys/netinet/tcp_subr.c (In reply to Ed Maste from comment #2) ^Triage: Re-categorized, thanks Ed. |