lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 13 Oct 2020 19:18:49 +0200 From: Kleber Sacilotto de Souza <kleber.souza@...onical.com> To: netdev@...r.kernel.org Cc: Gerrit Renker <gerrit@....abdn.ac.uk>, "David S. Miller" <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, Thadeu Lima de Souza Cascardo <cascardo@...onical.com>, "Gustavo A. R. Silva" <gustavoars@...nel.org>, "Alexander A. Klimov" <grandmaster@...klimov.de>, Kees Cook <keescook@...omium.org>, Eric Dumazet <edumazet@...gle.com>, Alexey Kodanev <alexey.kodanev@...cle.com>, dccp@...r.kernel.org, linux-kernel@...r.kernel.org Subject: [PATCH 2/2] Revert "dccp: don't free ccid2_hc_tx_sock struct in dccp_disconnect()" From: Thadeu Lima de Souza Cascardo <cascardo@...onical.com> This reverts commit 2677d20677314101293e6da0094ede7b5526d2b1. This fixes an issue that after disconnect, dccps_hc_tx_ccid will still be kept, allowing the socket to be reused as a listener socket, and the cloned socket will free its dccps_hc_tx_ccid, leading to a later use after free, when the listener socket is closed. This addresses CVE-2020-16119. Fixes: 2677d2067731 (dccp: don't free ccid2_hc_tx_sock struct in dccp_disconnect()) Reported-by: Hadar Manor Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@...onical.com> Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@...onical.com> --- net/dccp/proto.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/net/dccp/proto.c b/net/dccp/proto.c index 6d705d90c614..359e848dba6c 100644 --- a/net/dccp/proto.c +++ b/net/dccp/proto.c @@ -279,7 +279,9 @@ int dccp_disconnect(struct sock *sk, int flags) dccp_clear_xmit_timers(sk); ccid_hc_rx_delete(dp->dccps_hc_rx_ccid, sk); + ccid_hc_tx_delete(dp->dccps_hc_tx_ccid, sk); dp->dccps_hc_rx_ccid = NULL; + dp->dccps_hc_tx_ccid = NULL; __skb_queue_purge(&sk->sk_receive_queue); __skb_queue_purge(&sk->sk_write_queue); -- 2.25.1
Powered by blists - more mailing lists