lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Wed,  1 Jun 2022 14:46:25 +0800
From:   Hangyu Hua <hbh25y@...il.com>
To:     steffen.klassert@...unet.com, herbert@...dor.apana.org.au,
        davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
        pabeni@...hat.com, timo.teras@....fi
Cc:     netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
        Hangyu Hua <hbh25y@...il.com>
Subject: [PATCH v2] xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()

xfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of
pols[0]. This refcount can be dropped in xfrm_expand_policies() when
xfrm_expand_policies() return error. pols[0]'s refcount is balanced in
here. But xfrm_bundle_lookup() will also call xfrm_pols_put() with
num_pols == 1 to drop this refcount when xfrm_expand_policies() return
error.

This patch also fix an illegal address access. pols[0] will save a error
point when xfrm_policy_lookup fails. This lead to xfrm_pols_put to resolve
an illegal address in xfrm_bundle_lookup's error path.

Fix these by setting num_pols = 0 in xfrm_expand_policies()'s error path.

Fixes: 80c802f3073e ("xfrm: cache bundles instead of policies for outgoing flows")
Signed-off-by: Hangyu Hua <hbh25y@...il.com>
---

v2:
Fix an illegal address access.

An log about illegal address access:
[  444.538191] BUG: kernel NULL pointer dereference, address: 000000000000002f
[  444.538200] #PF: supervisor write access in kernel mode
[  444.538204] #PF: error_code(0x0002) - not-present page
[  444.538208] PGD 0 P4D 0 
[  444.538215] Oops: 0002 [#1] SMP NOPTI
[  444.538220] CPU: 0 PID: 729 Comm: systemd-resolve Tainted: G             L    5.10.0-1044-oem #46-Ubuntu
[  444.538222] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020
[  444.538226] watchdog: BUG: soft lockup - CPU#1 stuck for 34s! [in:imklog:838]
[  444.538232] RIP: 0010:xfrm_lookup_with_ifid+0x6b5/0xa00
[  444.538236] Code: c1 e1 03 4c 8d 64 35 b8 4c 8d 3c 30 49 29 cc eb 0d 85 c9 7e 4e 49 83 ef 08 4d 39 fc 74 24 49 8b 3f b9 ff ff ff ff 4c 8d 47 30 <f0> 0f c1 4f 30 83 f9 01 75 dd e8 ec 98 ff ff 49 83 ef 08 4d 39 fc
[  444.538237] RSP: 0018:ffffc900016af9f8 EFLAGS: 00010286
[  444.538241] Modules linked in:
[  444.538243] RAX: ffffc900016afa30 RBX: 00000000ffffffff RCX: 00000000ffffffff
[  444.538244]  rfcomm bnep ipmi_devintf
[  444.538248] RDX: 0000000000035f40 RSI: 0000000000000000 RDI: ffffffffffffffff
[  444.538251] RBP: ffffc900016afa70 R08: 000000000000002f R09: 0000000000000002
[  444.538252]  ipmi_msghandler vsock_loopback
[  444.538255] R10: 0000000080000000 R11: 000000007f000001 R12: ffffc900016afa28
[  444.538257] R13: ffff888100e07500 R14: ffffffff828ee1c0 R15: ffffc900016afa30
[  444.538258]  vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport
[  444.538262] FS:  00007fa7fb14cb80(0000) GS:ffff888139e00000(0000) knlGS:0000000000000000
[  444.538264] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  444.538267] CR2: 000000000000002f CR3: 00000001066f2003 CR4: 0000000000770ef0
[  444.538268]  vsock nls_iso8859_1 intel_rapl_msr snd_ens1371 snd_ac97_codec gameport ac97_bus intel_rapl_common crct10dif_pclmul snd_pcm ghash_clmulni_intel aesni_intel vmw_balloon crypto_simd
[  444.538282] PKRU: 55555554
[  444.538284] Call Trace:
[  444.538286]  snd_seq_midi cryptd glue_helper snd_seq_midi_event snd_rawmidi joydev
[  444.538293]  xfrm_lookup_route+0x23/0xa0
[  444.538294]  input_leds serio_raw btusb btrtl
[  444.538301]  ip_route_output_flow+0x58/0x60
[  444.538304]  udp_sendmsg+0x9ee/0xe30
[  444.538308]  ? put_cmsg+0x13e/0x170
[  444.538311]  ? ip_reply_glue_bits+0x50/0x50
[  444.538312]  btbcm btintel
[  444.538316]  ? skb_consume_udp+0x3f/0xd0
[  444.538319]  ? udp_recvmsg+0x1f7/0x5b0
[  444.538324]  ? __check_object_size+0x4d/0x150
[  444.538326]  ? __check_object_size+0x4d/0x150
[  444.538327]  snd_seq bluetooth ecdh_generic
[  444.538332]  ? _cond_resched+0x19/0x30
[  444.538338]  ? aa_sk_perm+0x43/0x1b0
[  444.538339]  ecc snd_seq_device snd_timer
[  444.538343]  inet_sendmsg+0x65/0x70
[  444.538346]  ? inet_sendmsg+0x65/0x70
[  444.538350]  sock_sendmsg+0x5e/0x70
[  444.538352]  ____sys_sendmsg+0x218/0x290
[  444.538355]  ? copy_msghdr_from_user+0x5c/0x90
[  444.538357]  ___sys_sendmsg+0x81/0xc0
[  444.538361]  ? kmem_cache_free+0x3c5/0x410
[  444.538362]  snd soundcore
[  444.538366]  ? dentry_free+0x37/0x70
[  444.538368]  vmw_vmci
[  444.538370]  ? mntput_no_expire+0x4c/0x260
[  444.538374]  ? __seccomp_filter+0x7f/0x670
[  444.538376]  __sys_sendmsg+0x62/0xb0
[  444.538378]  ? __secure_computing+0x42/0xe0
[  444.538381]  __x64_sys_sendmsg+0x1f/0x30
[  444.538382]  mac_hid sch_fq_codel vmwgfx
[  444.538386]  do_syscall_64+0x38/0x90
[  444.538390]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  444.538391]  ttm drm_kms_helper
[  444.538395] RIP: 0033:0x7fa7fc3f4617


 net/xfrm/xfrm_policy.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c
index f1876ea61fdc..f1a0bab920a5 100644
--- a/net/xfrm/xfrm_policy.c
+++ b/net/xfrm/xfrm_policy.c
@@ -2678,8 +2678,10 @@ static int xfrm_expand_policies(const struct flowi *fl, u16 family,
 		*num_xfrms = 0;
 		return 0;
 	}
-	if (IS_ERR(pols[0]))
+	if (IS_ERR(pols[0])) {
+		*num_pols = 0;
 		return PTR_ERR(pols[0]);
+	}
 
 	*num_xfrms = pols[0]->xfrm_nr;
 
@@ -2694,6 +2696,7 @@ static int xfrm_expand_policies(const struct flowi *fl, u16 family,
 		if (pols[1]) {
 			if (IS_ERR(pols[1])) {
 				xfrm_pols_put(pols, *num_pols);
+				*num_pols = 0;
 				return PTR_ERR(pols[1]);
 			}
 			(*num_pols)++;
-- 
2.25.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ