lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ed68e6a2-f9e8-4523-9104-98a97b54b153@redhat.com>
Date: Thu, 14 Aug 2025 18:38:54 +0200
From: Paolo Abeni <pabeni@...hat.com>
To: Daniel Zahka <daniel.zahka@...il.com>,
 Donald Hunter <donald.hunter@...il.com>, Jakub Kicinski <kuba@...nel.org>,
 "David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>,
 Simon Horman <horms@...nel.org>, Jonathan Corbet <corbet@....net>,
 Andrew Lunn <andrew+netdev@...n.ch>
Cc: Saeed Mahameed <saeedm@...dia.com>, Leon Romanovsky <leon@...nel.org>,
 Tariq Toukan <tariqt@...dia.com>, Boris Pismenny <borisp@...dia.com>,
 Kuniyuki Iwashima <kuniyu@...gle.com>, Willem de Bruijn
 <willemb@...gle.com>, David Ahern <dsahern@...nel.org>,
 Neal Cardwell <ncardwell@...gle.com>, Patrisious Haddad
 <phaddad@...dia.com>, Raed Salem <raeds@...dia.com>,
 Jianbo Liu <jianbol@...dia.com>, Dragos Tatulea <dtatulea@...dia.com>,
 Rahul Rameshbabu <rrameshbabu@...dia.com>,
 Stanislav Fomichev <sdf@...ichev.me>,
 Toke Høiland-Jørgensen <toke@...hat.com>,
 Alexander Lobakin <aleksander.lobakin@...el.com>,
 Kiran Kella <kiran.kella@...adcom.com>,
 Jacob Keller <jacob.e.keller@...el.com>, netdev@...r.kernel.org
Subject: Re: [PATCH net-next v6 09/19] net: psp: update the TCP MSS to reflect
 PSP packet overhead

On 8/14/25 4:50 PM, Daniel Zahka wrote:
> On 8/14/25 9:58 AM, Paolo Abeni wrote:
>> On 8/12/25 2:29 AM, Daniel Zahka wrote:
>>> @@ -236,6 +237,10 @@ int psp_sock_assoc_set_tx(struct sock *sk, struct psp_dev *psd,
>>>   	tcp_write_collapse_fence(sk);
>>>   	pas->upgrade_seq = tcp_sk(sk)->rcv_nxt;
>>>   
>>> +	icsk = inet_csk(sk);
>>> +	icsk->icsk_ext_hdr_len += psp_sk_overhead(sk);
>> I'm likely lost, but AFAICS the user-space can successfully call
>> multiple times psp_sock_assoc_set_tx() on the same socket, increasing
>> icsk->icsk_ext_hdr_len in an unbounded way.
> 
> If it were possible to execute the code you have highlighted more than 
> once per socket, that would be a bug. This should not be possible 
> because of the preceding checks in the function i.e.
> 
>      if (pas->tx.spi) {
>          NL_SET_ERR_MSG(extack, "Tx key already set");
>          err = -EBUSY;
>          goto exit_unlock;
>      }

AFAICS the nl code ensures the SPI attribute must be present, but also
allows a 0 value, so the above check could be eluded.

/P


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ