lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <86f924da-c742-44eb-aea4-9ac00a872198@gmail.com>
Date: Wed, 11 Feb 2026 21:20:56 +0100
From: Justin Iurman <justin.iurman@...il.com>
To: Qanux <qjx1298677004@...il.com>, netdev@...r.kernel.org
Cc: davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
 pabeni@...hat.com, horms@...nel.org, dsahern@...nel.org
Subject: Re: [PATCH net v2] ipv6: ioam: fix heap buffer overflow in
 __ioam6_fill_trace_data()

On 2/11/26 05:04, Qanux wrote:
> On the receive path, __ioam6_fill_trace_data() uses trace->nodelen
> to decide how much data to write for each node. It trusts this field
> as-is from the incoming packet, with no consistency check against
> trace->type (the 24-bit field that tells which data items are
> present). A crafted packet can set nodelen=0 while setting type bits
> 0-21, causing the function to write ~100 bytes past the allocated
> region (into skb_shared_info), which corrupts adjacent heap memory
> and leads to a kernel panic.
> 
> Add a shared helper ioam6_trace_compute_nodelen() in ioam6.c to
> derive the expected nodelen from the type field, and use it:
> 
>    - in ioam6_iptunnel.c (send path, existing validation) to replace
>      the open-coded computation;
>    - in exthdrs.c (receive path, ipv6_hop_ioam) to drop packets whose
>      nodelen is inconsistent with the type field, before any data is
>      written.
> 
> Per RFC 9197, bits 12-21 are each short (4-octet) fields, so they
> are included in IOAM6_MASK_SHORT_FIELDS (changed from 0xff100000 to
> 0xff1ffc00).
> 
> Fixes: 9ee11f0fff20 ("ipv6: ioam: Data plane support for Pre-allocated Trace")
> Cc: stable@...r.kernel.org
> Signed-off-by: Junxi Qian <qjx1298677004@...il.com>
> ---
> v1 -> v2:
>    - Don't recompute nodelen in the data plane; instead, validate
>      nodelen consistency in ipv6_hop_ioam() on the receive path and
>      drop inconsistent packets.
>    - Add shared helper ioam6_trace_compute_nodelen() in ioam6.c,
>      reuse it in both ioam6_iptunnel.c (send) and exthdrs.c (receive).
>    - Per RFC 9197, include bits 12-21 in IOAM6_MASK_SHORT_FIELDS
>      (0xff100000 -> 0xff1ffc00) instead of a separate UNDEF mask.
> 
> Thanks to Justin Iurman for the detailed review and suggestions.
> 
> The patch has been tested with the PoC that previously triggered the
> heap overflow. After applying this fix, the crafted packet is now
> correctly dropped at the receive path, and the kernel no longer panics.
> The patched kernel compiles and boots successfully.
> ---
>   include/net/ioam6.h       |  2 ++
>   net/ipv6/exthdrs.c        |  5 +++++
>   net/ipv6/ioam6.c          | 14 ++++++++++++++
>   net/ipv6/ioam6_iptunnel.c | 10 +---------
>   4 files changed, 22 insertions(+), 9 deletions(-)
> 
> diff --git a/include/net/ioam6.h b/include/net/ioam6.h
> index 2cbbee6e8..a75912fe2 100644
> --- a/include/net/ioam6.h
> +++ b/include/net/ioam6.h
> @@ -60,6 +60,8 @@ void ioam6_fill_trace_data(struct sk_buff *skb,
>   			   struct ioam6_trace_hdr *trace,
>   			   bool is_input);
>   
> +u8 ioam6_trace_compute_nodelen(u32 trace_type);
> +
>   int ioam6_init(void);
>   void ioam6_exit(void);
>   
> diff --git a/net/ipv6/exthdrs.c b/net/ipv6/exthdrs.c
> index a23eb8734..50062f98d 100644
> --- a/net/ipv6/exthdrs.c
> +++ b/net/ipv6/exthdrs.c
> @@ -930,6 +930,11 @@ static bool ipv6_hop_ioam(struct sk_buff *skb, int optoff)
>   		if (hdr->opt_len < 2 + sizeof(*trace) + trace->remlen * 4)
>   			goto drop;
>   
> +		/* Inconsistent Pre-allocated Trace header */
> +		if (trace->nodelen !=
> +		    ioam6_trace_compute_nodelen(be32_to_cpu(trace->type_be32)))
> +			goto drop;
> +
>   		/* Ignore if the IOAM namespace is unknown */
>   		ns = ioam6_namespace(dev_net(skb->dev), trace->namespace_id);
>   		if (!ns)
> diff --git a/net/ipv6/ioam6.c b/net/ipv6/ioam6.c
> index 9553a3200..08b7ac8c9 100644
> --- a/net/ipv6/ioam6.c
> +++ b/net/ipv6/ioam6.c
> @@ -690,6 +690,20 @@ struct ioam6_namespace *ioam6_namespace(struct net *net, __be16 id)
>   	return rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params);
>   }
>   
> +#define IOAM6_MASK_SHORT_FIELDS 0xff1ffc00
> +#define IOAM6_MASK_WIDE_FIELDS  0x00e00000
> +
> +u8 ioam6_trace_compute_nodelen(u32 trace_type)
> +{
> +	u8 nodelen = hweight32(trace_type & IOAM6_MASK_SHORT_FIELDS)
> +				* (sizeof(__be32) / 4);
> +
> +	nodelen += hweight32(trace_type & IOAM6_MASK_WIDE_FIELDS)
> +				* (sizeof(__be64) / 4);
> +
> +	return nodelen;
> +}
> +
>   static void __ioam6_fill_trace_data(struct sk_buff *skb,
>   				    struct ioam6_namespace *ns,
>   				    struct ioam6_trace_hdr *trace,
> diff --git a/net/ipv6/ioam6_iptunnel.c b/net/ipv6/ioam6_iptunnel.c
> index 1fe7894f1..b9f6d892a 100644
> --- a/net/ipv6/ioam6_iptunnel.c
> +++ b/net/ipv6/ioam6_iptunnel.c
> @@ -22,9 +22,6 @@
>   #include <net/ip6_route.h>
>   #include <net/addrconf.h>
>   
> -#define IOAM6_MASK_SHORT_FIELDS 0xff100000
> -#define IOAM6_MASK_WIDE_FIELDS 0xe00000
> -
>   struct ioam6_lwt_encap {
>   	struct ipv6_hopopt_hdr eh;
>   	u8 pad[2];			/* 2-octet padding for 4n-alignment */
> @@ -93,13 +90,8 @@ static bool ioam6_validate_trace_hdr(struct ioam6_trace_hdr *trace)
>   	    trace->type.bit21 | trace->type.bit23)
>   		return false;
>   
> -	trace->nodelen = 0;
>   	fields = be32_to_cpu(trace->type_be32);
> -
> -	trace->nodelen += hweight32(fields & IOAM6_MASK_SHORT_FIELDS)
> -				* (sizeof(__be32) / 4);
> -	trace->nodelen += hweight32(fields & IOAM6_MASK_WIDE_FIELDS)
> -				* (sizeof(__be64) / 4);
> +	trace->nodelen = ioam6_trace_compute_nodelen(fields);
>   
>   	return true;
>   }

LGTM, thanks.

Reviewed-by: Justin Iurman <justin.iurman@...il.com>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ