lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210113144841.GB17705@linux-8ccs>
Date:   Wed, 13 Jan 2021 15:48:42 +0100
From:   Jessica Yu <jeyu@...nel.org>
To:     Frank van der Linden <fllinden@...zon.com>
Cc:     linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2] module: harden ELF info handling

+++ Frank van der Linden [07/01/21 19:30 +0000]:
>5fdc7db644 ("module: setup load info before module_sig_check()")
>moved the ELF setup, so that it was done before the signature
>check. This made the module name available to signature error
>messages.
>
>However, the checks for ELF correctness in setup_load_info
>are not sufficient to prevent bad memory references due to
>corrupted offset fields, indices, etc.
>
>So, there's a regression in behavior here: a corrupt and unsigned
>(or badly signed) module, which might previously have been rejected
>immediately, can now cause an oops/crash.
>
>Harden ELF handling for module loading by doing the following:
>
>- Move the signature check back up so that it comes before ELF
>  initialization. It's best to do the signature check to see
>  if we can trust the module, before using the ELF structures
>  inside it. This also makes checks against info->len
>  more accurate again, as this field will be reduced by the
>  length of the signature in mod_check_sig().
>
>  The module name is now once again not available for error
>  messages during the signature check, but that seems like
>  a fair tradeoff.
>
>- Check if sections have offset / size fields that at least don't
>  exceed the length of the module.
>
>- Check if sections have section name offsets that don't fall
>  outside the section name table.
>
>- Add a few other sanity checks against invalid section indices,
>  etc.
>
>This is not an exhaustive consistency check, but the idea is to
>at least get through the signature and blacklist checks without
>crashing because of corrupted ELF info, and to error out gracefully
>for most issues that would have caused problems later on.
>
>Fixes: 5fdc7db644 ("module: setup load info before module_sig_check()")
>Signed-off-by: Frank van der Linden <fllinden@...zon.com>
>---
> kernel/module.c           | 143 ++++++++++++++++++++++++++++++++++++++++------
> kernel/module_signature.c |   2 +-
> kernel/module_signing.c   |   2 +-
> 3 files changed, 126 insertions(+), 21 deletions(-)
>
>diff --git a/kernel/module.c b/kernel/module.c
>index 4bf30e4b3eaa..34fc6c85eb65 100644
>--- a/kernel/module.c
>+++ b/kernel/module.c
>@@ -2964,7 +2964,7 @@ static int module_sig_check(struct load_info *info, int flags)
> 	}
>
> 	if (is_module_sig_enforced()) {
>-		pr_notice("%s: loading of %s is rejected\n", info->name, reason);
>+		pr_notice("Loading of %s is rejected\n", reason);
> 		return -EKEYREJECTED;
> 	}
>
>@@ -2977,9 +2977,33 @@ static int module_sig_check(struct load_info *info, int flags)
> }
> #endif /* !CONFIG_MODULE_SIG */
>
>-/* Sanity checks against invalid binaries, wrong arch, weird elf version. */
>-static int elf_header_check(struct load_info *info)
>+static int validate_section_offset(struct load_info *info, Elf_Shdr *shdr)
> {
>+	unsigned long secend;
>+
>+	/*
>+	 * Check for both overflow and offset/size being
>+	 * too large.
>+	 */
>+	secend = shdr->sh_offset + shdr->sh_size;
>+	if (secend < shdr->sh_offset || secend > info->len)
>+		return -ENOEXEC;
>+
>+	return 0;
>+}
>+
>+/*
>+ * Sanity checks against invalid binaries, wrong arch, weird elf version.
>+ *
>+ * Also do basic validity checks against section offsets and sizes, the
>+ * section name string table, and the indices used for it (sh_name).
>+ */
>+static int elf_validity_check(struct load_info *info)
>+{
>+	unsigned int i;
>+	Elf_Shdr *shdr, *strhdr;
>+	int err;
>+
> 	if (info->len < sizeof(*(info->hdr)))
> 		return -ENOEXEC;
>
>@@ -2989,11 +3013,78 @@ static int elf_header_check(struct load_info *info)
> 	    || info->hdr->e_shentsize != sizeof(Elf_Shdr))
> 		return -ENOEXEC;
>
>+	/*
>+	 * e_shnum is 16 bits, and sizeof(Elf_Shdr) is
>+	 * known and small. So e_shnum * sizeof(Elf_Shdr)
>+	 * will not overflow unsigned long on any platform.
>+	 */
> 	if (info->hdr->e_shoff >= info->len
> 	    || (info->hdr->e_shnum * sizeof(Elf_Shdr) >
> 		info->len - info->hdr->e_shoff))
> 		return -ENOEXEC;
>
>+	info->sechdrs = (void *)info->hdr + info->hdr->e_shoff;
>+
>+	/*
>+	 * Verify if the section name table index is valid.
>+	 */
>+	if (info->hdr->e_shstrndx == SHN_UNDEF
>+	    || info->hdr->e_shstrndx >= info->hdr->e_shnum)
>+		return -ENOEXEC;
>+
>+	strhdr = &info->sechdrs[info->hdr->e_shstrndx];
>+	err = validate_section_offset(info, strhdr);
>+	if (err < 0)
>+		return err;
>+
>+	/*
>+	 * The section name table must be NUL-terminated, as required
>+	 * by the spec. This makes strcmp and pr_* calls that access
>+	 * strings in the section safe.
>+	 */
>+	info->secstrings = (void *)info->hdr + strhdr->sh_offset;
>+	if (info->secstrings[strhdr->sh_size - 1] != '\0')
>+		return -ENOEXEC;
>+
>+	/*
>+	 * The code assumes that section 0 has a length of zero and
>+	 * an addr of zero, so check for it.
>+	 */
>+	if (info->sechdrs[0].sh_type != SHT_NULL
>+	    || info->sechdrs[0].sh_size != 0
>+	    || info->sechdrs[0].sh_addr != 0)
>+		return -ENOEXEC;
>+
>+	for (i = 1; i < info->hdr->e_shnum; i++) {
>+		shdr = &info->sechdrs[i];
>+		switch (shdr->sh_type) {
>+		case SHT_NULL:
>+		case SHT_NOBITS:
>+			continue;
>+		case SHT_SYMTAB:
>+			if (shdr->sh_link == SHN_UNDEF
>+			    || shdr->sh_link >= info->hdr->e_shnum)
>+				return -ENOEXEC;
>+			fallthrough;
>+		default:
>+			err = validate_section_offset(info, shdr);
>+			if (err < 0) {
>+				pr_err("Invalid ELF section in module (section %u type %u)\n",
>+					i, shdr->sh_type);
>+				return err;
>+			}
>+
>+			if (shdr->sh_flags & SHF_ALLOC) {
>+				if (shdr->sh_name >= strhdr->sh_size) {
>+					pr_err("Invalid ELF section name in module (section num %u type %u)\n",

Small nit: Maybe remove "num", to be consistent with the other pr_err() above.

>+					       i, shdr->sh_type);
>+					return -ENOEXEC;
>+				}
>+			}
>+			break;
>+		}
>+	}
>+
> 	return 0;
> }
>
>@@ -3095,11 +3186,6 @@ static int rewrite_section_headers(struct load_info *info, int flags)
>
> 	for (i = 1; i < info->hdr->e_shnum; i++) {
> 		Elf_Shdr *shdr = &info->sechdrs[i];
>-		if (shdr->sh_type != SHT_NOBITS
>-		    && info->len < shdr->sh_offset + shdr->sh_size) {
>-			pr_err("Module len %lu truncated\n", info->len);
>-			return -ENOEXEC;
>-		}
>
> 		/*
> 		 * Mark all sections sh_addr with their address in the
>@@ -3133,11 +3219,6 @@ static int setup_load_info(struct load_info *info, int flags)
> {
> 	unsigned int i;
>
>-	/* Set up the convenience variables */
>-	info->sechdrs = (void *)info->hdr + info->hdr->e_shoff;
>-	info->secstrings = (void *)info->hdr
>-		+ info->sechdrs[info->hdr->e_shstrndx].sh_offset;
>-
> 	/* Try to find a name early so we can log errors with a module name */
> 	info->index.info = find_sec(info, ".modinfo");
> 	if (info->index.info)
>@@ -3894,26 +3975,50 @@ static int load_module(struct load_info *info, const char __user *uargs,
> 	long err = 0;
> 	char *after_dashes;
>
>-	err = elf_header_check(info);
>+	/*
>+	 * Do the signature check (if any) first. All that
>+	 * the signature check needs is info->len, it does
>+	 * not need any of the section info. That can be
>+	 * set up later. This will minimize the chances
>+	 * of a corrupt module causing problems before
>+	 * we even get to the signature check.
>+	 *
>+	 * The check will also adjust info->len by stripping
>+	 * off the sig length at the end of the module, making
>+	 * checks against info->len more correct.
>+	 */
>+	err = module_sig_check(info, flags);
>+	if (err)
>+		goto free_copy;
>+
>+	/*
>+	 * Do basic sanity checks against the ELF header and
>+	 * sections.
>+	 */
>+	err = elf_validity_check(info);
> 	if (err) {
>-		pr_err("Module has invalid ELF header\n");
>+		pr_err("Module has invalid ELF structures\n");
> 		goto free_copy;
> 	}
>
>+	/*
>+	 * Everything checks out, so set up the section info
>+	 * in the info structure.
>+	 */
> 	err = setup_load_info(info, flags);
> 	if (err)
> 		goto free_copy;
>
>+	/*
>+	 * Now that we know we have the correct module name, check
>+	 * if it's blacklisted.
>+	 */
> 	if (blacklisted(info->name)) {
> 		err = -EPERM;
> 		pr_err("Module %s is blacklisted\n", info->name);
> 		goto free_copy;
> 	}
>
>-	err = module_sig_check(info, flags);
>-	if (err)
>-		goto free_copy;
>-
> 	err = rewrite_section_headers(info, flags);
> 	if (err)
> 		goto free_copy;
>diff --git a/kernel/module_signature.c b/kernel/module_signature.c
>index 4224a1086b7d..00132d12487c 100644
>--- a/kernel/module_signature.c
>+++ b/kernel/module_signature.c
>@@ -25,7 +25,7 @@ int mod_check_sig(const struct module_signature *ms, size_t file_len,
> 		return -EBADMSG;
>
> 	if (ms->id_type != PKEY_ID_PKCS7) {
>-		pr_err("%s: Module is not signed with expected PKCS#7 message\n",
>+		pr_err("%s: not signed with expected PKCS#7 message\n",
> 		       name);
> 		return -ENOPKG;
> 	}
>diff --git a/kernel/module_signing.c b/kernel/module_signing.c
>index 9d9fc678c91d..9a057c5d1d4d 100644
>--- a/kernel/module_signing.c
>+++ b/kernel/module_signing.c
>@@ -30,7 +30,7 @@ int mod_verify_sig(const void *mod, struct load_info *info)
>
> 	memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms));
>
>-	ret = mod_check_sig(&ms, modlen, info->name);
>+	ret = mod_check_sig(&ms, modlen, info->name ?: "module");

Since info->name is not expected to be valid anymore, as we're back to
calling mod_sig_check() first thing, perhaps just stick with
"module"? Or was there another reason for checking info->name here?

Thanks,

Jessica

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ