lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 24 Jun 2022 15:07:54 +0900
From:   "Dae R. Jeong" <threeearcat@...il.com>
To:     davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
        pabeni@...hat.com, netdev@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: KASAN: use-after-free Read in cfusbl_device_notify

Hello,

We observed a crash "KASAN: use-after-free Read in cfusbl_device_notify" during fuzzing.

Unfortunately, we have not found a reproducer for the crash yet. We
will inform you if we have any update on this crash.

Detailed crash information is attached at the end of this email.


Best regards,
Dae R. Jeong.
------

- Kernel commit:
b13baccc3850ca

- Crash report: 
==================================================================
BUG: KASAN: use-after-free in cfusbl_device_notify+0x155/0xf40 net/caif/caif_usb.c:138
Read of size 8 at addr ffff88804bc4c6f0 by task kworker/u8:0/18109

CPU: 1 PID: 18109 Comm: kworker/u8:0 Not tainted 5.19.0-rc2-31838-gef9c98f9637f #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
Workqueue: netns cleanup_net
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x240/0x35a lib/dump_stack.c:106
 print_address_description+0x65/0x4f0 mm/kasan/report.c:313
 print_report+0xf4/0x1e0 mm/kasan/report.c:429
 kasan_report+0xe5/0x110 mm/kasan/report.c:491
 cfusbl_device_notify+0x155/0xf40 net/caif/caif_usb.c:138
 notifier_call_chain kernel/notifier.c:87 [inline]
 raw_notifier_call_chain+0xd4/0x170 kernel/notifier.c:455
 call_netdevice_notifiers_info net/core/dev.c:1943 [inline]
 call_netdevice_notifiers_extack net/core/dev.c:1981 [inline]
 call_netdevice_notifiers net/core/dev.c:1995 [inline]
 netdev_wait_allrefs_any net/core/dev.c:10225 [inline]
 netdev_run_todo+0x14e6/0x23c0 net/core/dev.c:10337
 default_device_exit_batch+0x99a/0xa10 net/core/dev.c:11329
 ops_exit_list net/core/net_namespace.c:167 [inline]
 cleanup_net+0xd23/0x15a0 net/core/net_namespace.c:594
 process_one_work+0x909/0x12b0 kernel/workqueue.c:2289
 worker_thread+0xab1/0x1320 kernel/workqueue.c:2436
 kthread+0x294/0x330 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30
 </TASK>

Allocated by task 6688:
 kasan_save_stack mm/kasan/common.c:38 [inline]
 kasan_set_track mm/kasan/common.c:45 [inline]
 set_alloc_info mm/kasan/common.c:436 [inline]
 ____kasan_kmalloc mm/kasan/common.c:515 [inline]
 __kasan_kmalloc+0xac/0xe0 mm/kasan/common.c:524
 kasan_kmalloc include/linux/kasan.h:234 [inline]
 __kmalloc_node+0xed/0x780 mm/slub.c:4465
 kmalloc_node include/linux/slab.h:623 [inline]
 kvmalloc_node+0x6e/0x1a0 mm/util.c:613
 kvmalloc include/linux/slab.h:750 [inline]
 kvzalloc include/linux/slab.h:758 [inline]
 alloc_netdev_mqs+0x94/0x1da0 net/core/dev.c:10576
 rtnl_create_link+0x4ec/0x1360 net/core/rtnetlink.c:3241
 veth_newlink+0x4a9/0x1810 drivers/net/veth.c:1749
 rtnl_newlink_create net/core/rtnetlink.c:3363 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3580 [inline]
 rtnl_newlink+0x251d/0x2fc0 net/core/rtnetlink.c:3593
 rtnetlink_rcv_msg+0x1103/0x1a60 net/core/rtnetlink.c:6089
 netlink_rcv_skb+0x2b6/0x670 net/netlink/af_netlink.c:2501
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0xc68/0xff0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x11a0/0x1680 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:693 [inline]
 sock_sendmsg net/socket.c:713 [inline]
 __sys_sendto+0x544/0x770 net/socket.c:2098
 __do_sys_sendto net/socket.c:2110 [inline]
 __se_sys_sendto net/socket.c:2106 [inline]
 __x64_sys_sendto+0x1bb/0x250 net/socket.c:2106
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x4e/0xa0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Freed by task 18109:
 kasan_save_stack mm/kasan/common.c:38 [inline]
 kasan_set_track+0x3d/0x60 mm/kasan/common.c:45
 kasan_set_free_info+0x1f/0x40 mm/kasan/generic.c:370
 ____kasan_slab_free+0xb2/0xf0 mm/kasan/common.c:366
 kasan_slab_free include/linux/kasan.h:200 [inline]
 slab_free_hook mm/slub.c:1727 [inline]
 slab_free_freelist_hook+0x20c/0x540 mm/slub.c:1753
 slab_free mm/slub.c:3507 [inline]
 kfree+0x117/0x7e0 mm/slub.c:4555
 device_release+0xf5/0x390
 kobject_cleanup+0x340/0x4e0 lib/kobject.c:673
 netdev_run_todo+0x211c/0x23c0 net/core/dev.c:10358
 default_device_exit_batch+0x99a/0xa10 net/core/dev.c:11329
 ops_exit_list net/core/net_namespace.c:167 [inline]
 cleanup_net+0xd23/0x15a0 net/core/net_namespace.c:594
 process_one_work+0x909/0x12b0 kernel/workqueue.c:2289
 worker_thread+0xab1/0x1320 kernel/workqueue.c:2436
 kthread+0x294/0x330 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30

The buggy address belongs to the object at ffff88804bc4c000
 which belongs to the cache kmalloc-cg-4k of size 4096
The buggy address is located 1776 bytes inside of
 4096-byte region [ffff88804bc4c000, ffff88804bc4d000)

The buggy address belongs to the physical page:
page:ffffea00012f1200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4bc48
head:ffffea00012f1200 order:3 compound_mapcount:0 compound_pincount:0
flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000010200 0000000000000000 dead000000000122 ffff88801844c140
raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 6688, tgid 6688 (syz-executor.0), ts 297836664488, free_ts 31867390869
 prep_new_page mm/page_alloc.c:2456 [inline]
 get_page_from_freelist+0xa7c/0xf50 mm/page_alloc.c:4198
 __alloc_pages+0x30e/0x710 mm/page_alloc.c:5426
 alloc_slab_page+0x66/0x250 mm/slub.c:1797
 allocate_slab+0xc0/0xe40 mm/slub.c:1942
 new_slab mm/slub.c:2002 [inline]
 ___slab_alloc+0x629/0x17a0 mm/slub.c:3002
 __slab_alloc mm/slub.c:3089 [inline]
 slab_alloc_node mm/slub.c:3180 [inline]
 slab_alloc mm/slub.c:3222 [inline]
 __kmalloc_track_caller+0x53a/0x600 mm/slub.c:4919
 kmemdup+0x21/0x50 mm/util.c:129
 _Z7kmemdupPKvU17pass_object_size0mj include/linux/fortify-string.h:456 [inline]
 __addrconf_sysctl_register+0x97/0x680 net/ipv6/addrconf.c:7061
 addrconf_sysctl_register+0x1c3/0x2a0 net/ipv6/addrconf.c:7126
 ipv6_add_dev+0x170e/0x1f80 net/ipv6/addrconf.c:450
 addrconf_notify+0xa36/0x3730 net/ipv6/addrconf.c:3532
 notifier_call_chain kernel/notifier.c:87 [inline]
 raw_notifier_call_chain+0xd4/0x170 kernel/notifier.c:455
 call_netdevice_notifiers_info net/core/dev.c:1943 [inline]
 call_netdevice_notifiers_extack net/core/dev.c:1981 [inline]
 call_netdevice_notifiers net/core/dev.c:1995 [inline]
 register_netdevice+0x23b1/0x32c0 net/core/dev.c:10078
 hsr_dev_finalize+0x803/0xd50 net/hsr/hsr_device.c:539
 hsr_newlink+0xba5/0xcf0 net/hsr/hsr_netlink.c:102
 rtnl_newlink_create net/core/rtnetlink.c:3363 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3580 [inline]
 rtnl_newlink+0x251d/0x2fc0 net/core/rtnetlink.c:3593
page last free stack trace:
 reset_page_owner include/linux/page_owner.h:24 [inline]
 free_pages_prepare mm/page_alloc.c:1371 [inline]
 free_pcp_prepare+0xa65/0xc90 mm/page_alloc.c:1421
 free_unref_page_prepare mm/page_alloc.c:3343 [inline]
 free_unref_page+0x7e/0x740 mm/page_alloc.c:3438
 free_contig_range+0xd9/0x240 mm/page_alloc.c:9314
 destroy_args+0x153/0xee4 mm/debug_vm_pgtable.c:1031
 debug_vm_pgtable+0x4bd/0x553 mm/debug_vm_pgtable.c:1354
 do_one_initcall+0x1a8/0x410 init/main.c:1295
 do_initcall_level+0x168/0x21d init/main.c:1368
 do_initcalls+0x50/0x91 init/main.c:1384
 kernel_init_freeable+0x40d/0x59a init/main.c:1610
 kernel_init+0x19/0x2c0 init/main.c:1499
 ret_from_fork+0x1f/0x30

Memory state around the buggy address:
 ffff88804bc4c580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff88804bc4c600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff88804bc4c680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                             ^
 ffff88804bc4c700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff88804bc4c780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ