lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 23 Oct 2023 15:31:25 +0530
From: Kaustubh Pandey <quic_kapandey@...cinc.com>
To: <mark.tomlinson@...iedtelesis.co.nz>, <pablo@...filter.org>,
        <netdev@...r.kernel.org>
CC: <quic_sharathv@...cinc.com>, <quic_subashab@...cinc.com>
Subject: KASAN: vmalloc-out-of-bounds in ipt_do_table

Hi Everyone,

We have observed below issue on v5.15 kernel

[83180.055298]
==================================================================
[83180.055376] BUG: KASAN: vmalloc-out-of-bounds in ipt_do_table+0x43c/0xaf4
[83180.055464] Read of size 8 at addr ffffffc02c0f9000 by task Disposer/1686
[83180.055544] CPU: 1 PID: 1686 Comm: Disposer Tainted: G S      W  OE
  5.15.78-android13-8-g3d973ad4cc47 #1
[83180.055613] Hardware name: Qualcomm Technologies, Inc. Kalama
MTP,davinci DVT (DT)
[83180.055655] Call trace:
[83180.055677]  dump_backtrace+0x0/0x3b0
[83180.055740]  show_stack+0x2c/0x3c
[83180.055792]  dump_stack_lvl+0x8c/0xa8
[83180.055866]  print_address_description+0x74/0x384
[83180.055940]  kasan_report+0x180/0x260
[83180.056002]  __asan_load8+0xb4/0xb8
[83180.056064]  ipt_do_table+0x43c/0xaf4
[83180.056120]  iptable_mangle_hook+0xf4/0x22c
[83180.056182]  nf_hook_slow+0x90/0x198
[83180.056245]  ip_mc_output+0x50c/0x67c
[83180.056302]  ip_send_skb+0x88/0x1bc
[83180.056355]  udp_send_skb+0x524/0x930
[83180.056415]  udp_sendmsg+0x126c/0x13ac
[83180.056474]  udpv6_sendmsg+0x6d4/0x1764
[83180.056539]  inet6_sendmsg+0x78/0x98
[83180.056605]  __sys_sendto+0x360/0x450
[83180.056667]  __arm64_sys_sendto+0x80/0x9c
[83180.056725]  invoke_syscall+0x80/0x218
[83180.056791]  el0_svc_common+0x18c/0x1bc
[83180.056857]  do_el0_svc+0x44/0xfc
[83180.056918]  el0_svc+0x20/0x50
[83180.056966]  el0t_64_sync_handler+0x84/0xe4
[83180.057020]  el0t_64_sync+0x1a4/0x1a8
[83180.057110] Memory state around the buggy address:
[83180.057150]  ffffffc02c0f8f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
f8 f8 f8
[83180.057193]  ffffffc02c0f8f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
f8 f8 f8
[83180.057237] >ffffffc02c0f9000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
f8 f8 f8
[83180.057269]                    ^
[83180.057304]  ffffffc02c0f9080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
f8 f8 f8
[83180.057345]  ffffffc02c0f9100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
f8 f8 f8
[83180.057378]
==================================================================

There are no reproduction steps available for this.

I have checked along the lines and see that
https://github.com/torvalds/linux/commit/175e476b8cdf2a4de7432583b49c871345e4f8a1
is still present in this kernel.
Checked around similar lines in latest kernel and still see that
implementation hasnt  changed much.

Can you pls help check if this is a known issue and was fixed in latest
or help in pointing out how to debug this further ?

Thanks,
Kaustubh

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ