lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <2025070337-CVE-2025-38154-8353@gregkh> Date: Thu, 3 Jul 2025 10:36:10 +0200 From: Greg Kroah-Hartman <gregkh@...uxfoundation.org> To: linux-cve-announce@...r.kernel.org Cc: Greg Kroah-Hartman <gregkh@...nel.org> Subject: CVE-2025-38154: bpf, sockmap: Avoid using sk_socket after free when sending From: Greg Kroah-Hartman <gregkh@...nel.org> Description =========== In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Avoid using sk_socket after free when sending The sk->sk_socket is not locked or referenced in backlog thread, and during the call to skb_send_sock(), there is a race condition with the release of sk_socket. All types of sockets(tcp/udp/unix/vsock) will be affected. Race conditions: ''' CPU0 CPU1 backlog::skb_send_sock sendmsg_unlocked sock_sendmsg sock_sendmsg_nosec close(fd): ... ops->release() -> sock_map_close() sk_socket->ops = NULL free(socket) sock->ops->sendmsg ^ panic here ''' The ref of psock become 0 after sock_map_close() executed. ''' void sock_map_close() { ... if (likely(psock)) { ... // !! here we remove psock and the ref of psock become 0 sock_map_remove_links(sk, psock) psock = sk_psock_get(sk); if (unlikely(!psock)) goto no_psock; <=== Control jumps here via goto ... cancel_delayed_work_sync(&psock->work); <=== not executed sk_psock_put(sk, psock); ... } ''' Based on the fact that we already wait for the workqueue to finish in sock_map_close() if psock is held, we simply increase the psock reference count to avoid race conditions. With this patch, if the backlog thread is running, sock_map_close() will wait for the backlog thread to complete and cancel all pending work. If no backlog running, any pending work that hasn't started by then will fail when invoked by sk_psock_get(), as the psock reference count have been zeroed, and sk_psock_drop() will cancel all jobs via cancel_delayed_work_sync(). In summary, we require synchronization to coordinate the backlog thread and close() thread. The panic I catched: ''' Workqueue: events sk_psock_backlog RIP: 0010:sock_sendmsg+0x21d/0x440 RAX: 0000000000000000 RBX: ffffc9000521fad8 RCX: 0000000000000001 ... Call Trace: <TASK> ? die_addr+0x40/0xa0 ? exc_general_protection+0x14c/0x230 ? asm_exc_general_protection+0x26/0x30 ? sock_sendmsg+0x21d/0x440 ? sock_sendmsg+0x3e0/0x440 ? __pfx_sock_sendmsg+0x10/0x10 __skb_send_sock+0x543/0xb70 sk_psock_backlog+0x247/0xb80 ... ''' The Linux kernel CVE team has assigned CVE-2025-38154 to this issue. Affected and fixed versions =========================== Issue introduced in 5.15.162 with commit 4959ffc65a0e94f8acaac20deac49f89e6ded52d and fixed in 5.15.186 with commit 4edb40b05cb6a261775abfd8046804ca139a5546 Issue introduced in 6.1.95 with commit 5eabdf17fed2ad41b836bb4055ec36d95e512c50 and fixed in 6.1.142 with commit b19cbf0b9a91f5a0d93fbcd761ff71c48ab40ed9 Issue introduced in 6.6.35 with commit e946428439a0d2079959f5603256ac51b6047017 and fixed in 6.6.94 with commit 4c6fa65ab2aec7df94809478c8d28ef38676a1b7 Issue introduced in 6.10 with commit 4b4647add7d3c8530493f7247d11e257ee425bf0 and fixed in 6.12.34 with commit 15c0250dae3b48a398447d2b364603821ed4ed90 Issue introduced in 6.10 with commit 4b4647add7d3c8530493f7247d11e257ee425bf0 and fixed in 6.15.3 with commit 7c0a16f6ea2b1c82a03bccd5d1bdb4a7bbd4d987 Issue introduced in 6.10 with commit 4b4647add7d3c8530493f7247d11e257ee425bf0 and fixed in 6.16-rc1 with commit 8259eb0e06d8f64c700f5fbdb28a5c18e10de291 Issue introduced in 6.9.6 with commit 3627605de498639a3c586c8684d12c89cba11073 Please see https://www.kernel.org for a full list of currently supported kernel versions by the kernel community. Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=CVE-2025-38154 will be updated if fixes are backported, please check that for the most up to date information about this issue. Affected files ============== The file(s) affected by this issue are: net/core/skmsg.c Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual changes to resolve this issue can be found at these commits: https://git.kernel.org/stable/c/4edb40b05cb6a261775abfd8046804ca139a5546 https://git.kernel.org/stable/c/b19cbf0b9a91f5a0d93fbcd761ff71c48ab40ed9 https://git.kernel.org/stable/c/4c6fa65ab2aec7df94809478c8d28ef38676a1b7 https://git.kernel.org/stable/c/15c0250dae3b48a398447d2b364603821ed4ed90 https://git.kernel.org/stable/c/7c0a16f6ea2b1c82a03bccd5d1bdb4a7bbd4d987 https://git.kernel.org/stable/c/8259eb0e06d8f64c700f5fbdb28a5c18e10de291
Powered by blists - more mailing lists