All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jiri Slaby <jslaby@suse.cz>
To: stable@vger.kernel.org
Cc: linux-kernel@vger.kernel.org,
	Daniel Borkmann <daniel@iogearbox.net>,
	PaX Team <pageexec@freemail.hu>, Emese Revfy <re.emese@gmail.com>,
	Brad Spengler <spender@grsecurity.net>,
	Wei Yongjun <yongjun_wei@trendmicro.com.cn>,
	Eric Dumazet <edumazet@google.com>,
	"David S . Miller" <davem@davemloft.net>,
	Jiri Slaby <jslaby@suse.cz>
Subject: [PATCH 3.12 13/91] net, scm: fix PaX detected msg_controllen overflow in scm_detach_fds
Date: Tue,  5 Jan 2016 18:45:57 +0100	[thread overview]
Message-ID: <8478662197240c86bb81441f6f6f711b9d7a0e33.1452015822.git.jslaby@suse.cz> (raw)
In-Reply-To: <ba880cfbf85370a46062a2894a70d35260f26f2b.1452015821.git.jslaby@suse.cz>
In-Reply-To: <cover.1452015821.git.jslaby@suse.cz>

From: Daniel Borkmann <daniel@iogearbox.net>

3.12-stable review patch.  If anyone has any objections, please let me know.

===============

[ Upstream commit 6900317f5eff0a7070c5936e5383f589e0de7a09 ]

David and HacKurx reported a following/similar size overflow triggered
in a grsecurity kernel, thanks to PaX's gcc size overflow plugin:

(Already fixed in later grsecurity versions by Brad and PaX Team.)

[ 1002.296137] PAX: size overflow detected in function scm_detach_fds net/core/scm.c:314
               cicus.202_127 min, count: 4, decl: msg_controllen; num: 0; context: msghdr;
[ 1002.296145] CPU: 0 PID: 3685 Comm: scm_rights_recv Not tainted 4.2.3-grsec+ #7
[ 1002.296149] Hardware name: Apple Inc. MacBookAir5,1/Mac-66F35F19FE2A0D05, [...]
[ 1002.296153]  ffffffff81c27366 0000000000000000 ffffffff81c27375 ffffc90007843aa8
[ 1002.296162]  ffffffff818129ba 0000000000000000 ffffffff81c27366 ffffc90007843ad8
[ 1002.296169]  ffffffff8121f838 fffffffffffffffc fffffffffffffffc ffffc90007843e60
[ 1002.296176] Call Trace:
[ 1002.296190]  [<ffffffff818129ba>] dump_stack+0x45/0x57
[ 1002.296200]  [<ffffffff8121f838>] report_size_overflow+0x38/0x60
[ 1002.296209]  [<ffffffff816a979e>] scm_detach_fds+0x2ce/0x300
[ 1002.296220]  [<ffffffff81791899>] unix_stream_read_generic+0x609/0x930
[ 1002.296228]  [<ffffffff81791c9f>] unix_stream_recvmsg+0x4f/0x60
[ 1002.296236]  [<ffffffff8178dc00>] ? unix_set_peek_off+0x50/0x50
[ 1002.296243]  [<ffffffff8168fac7>] sock_recvmsg+0x47/0x60
[ 1002.296248]  [<ffffffff81691522>] ___sys_recvmsg+0xe2/0x1e0
[ 1002.296257]  [<ffffffff81693496>] __sys_recvmsg+0x46/0x80
[ 1002.296263]  [<ffffffff816934fc>] SyS_recvmsg+0x2c/0x40
[ 1002.296271]  [<ffffffff8181a3ab>] entry_SYSCALL_64_fastpath+0x12/0x85

Further investigation showed that this can happen when an *odd* number of
fds are being passed over AF_UNIX sockets.

In these cases CMSG_LEN(i * sizeof(int)) and CMSG_SPACE(i * sizeof(int)),
where i is the number of successfully passed fds, differ by 4 bytes due
to the extra CMSG_ALIGN() padding in CMSG_SPACE() to an 8 byte boundary
on 64 bit. The padding is used to align subsequent cmsg headers in the
control buffer.

When the control buffer passed in from the receiver side *lacks* these 4
bytes (e.g. due to buggy/wrong API usage), then msg->msg_controllen will
overflow in scm_detach_fds():

  int cmlen = CMSG_LEN(i * sizeof(int));  <--- cmlen w/o tail-padding
  err = put_user(SOL_SOCKET, &cm->cmsg_level);
  if (!err)
    err = put_user(SCM_RIGHTS, &cm->cmsg_type);
  if (!err)
    err = put_user(cmlen, &cm->cmsg_len);
  if (!err) {
    cmlen = CMSG_SPACE(i * sizeof(int));  <--- cmlen w/ 4 byte extra tail-padding
    msg->msg_control += cmlen;
    msg->msg_controllen -= cmlen;         <--- iff no tail-padding space here ...
  }                                            ... wrap-around

F.e. it will wrap to a length of 18446744073709551612 bytes in case the
receiver passed in msg->msg_controllen of 20 bytes, and the sender
properly transferred 1 fd to the receiver, so that its CMSG_LEN results
in 20 bytes and CMSG_SPACE in 24 bytes.

In case of MSG_CMSG_COMPAT (scm_detach_fds_compat()), I haven't seen an
issue in my tests as alignment seems always on 4 byte boundary. Same
should be in case of native 32 bit, where we end up with 4 byte boundaries
as well.

In practice, passing msg->msg_controllen of 20 to recvmsg() while receiving
a single fd would mean that on successful return, msg->msg_controllen is
being set by the kernel to 24 bytes instead, thus more than the input
buffer advertised. It could f.e. become an issue if such application later
on zeroes or copies the control buffer based on the returned msg->msg_controllen
elsewhere.

Maximum number of fds we can send is a hard upper limit SCM_MAX_FD (253).

Going over the code, it seems like msg->msg_controllen is not being read
after scm_detach_fds() in scm_recv() anymore by the kernel, good!

Relevant recvmsg() handler are unix_dgram_recvmsg() (unix_seqpacket_recvmsg())
and unix_stream_recvmsg(). Both return back to their recvmsg() caller,
and ___sys_recvmsg() places the updated length, that is, new msg_control -
old msg_control pointer into msg->msg_controllen (hence the 24 bytes seen
in the example).

Long time ago, Wei Yongjun fixed something related in commit 1ac70e7ad24a
("[NET]: Fix function put_cmsg() which may cause usr application memory
overflow").

RFC3542, section 20.2. says:

  The fields shown as "XX" are possible padding, between the cmsghdr
  structure and the data, and between the data and the next cmsghdr
  structure, if required by the implementation. While sending an
  application may or may not include padding at the end of last
  ancillary data in msg_controllen and implementations must accept both
  as valid. On receiving a portable application must provide space for
  padding at the end of the last ancillary data as implementations may
  copy out the padding at the end of the control message buffer and
  include it in the received msg_controllen. When recvmsg() is called
  if msg_controllen is too small for all the ancillary data items
  including any trailing padding after the last item an implementation
  may set MSG_CTRUNC.

Since we didn't place MSG_CTRUNC for already quite a long time, just do
the same as in 1ac70e7ad24a to avoid an overflow.

Btw, even man-page author got this wrong :/ See db939c9b26e9 ("cmsg.3: Fix
error in SCM_RIGHTS code sample"). Some people must have copied this (?),
thus it got triggered in the wild (reported several times during boot by
David and HacKurx).

No Fixes tag this time as pre 2002 (that is, pre history tree).

Reported-by: David Sterba <dave@jikos.cz>
Reported-by: HacKurx <hackurx@gmail.com>
Cc: PaX Team <pageexec@freemail.hu>
Cc: Emese Revfy <re.emese@gmail.com>
Cc: Brad Spengler <spender@grsecurity.net>
Cc: Wei Yongjun <yongjun_wei@trendmicro.com.cn>
Cc: Eric Dumazet <edumazet@google.com>
Reviewed-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Jiri Slaby <jslaby@suse.cz>
---
 net/core/scm.c | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/net/core/scm.c b/net/core/scm.c
index b442e7e25e60..d30eb057fa7b 100644
--- a/net/core/scm.c
+++ b/net/core/scm.c
@@ -306,6 +306,8 @@ void scm_detach_fds(struct msghdr *msg, struct scm_cookie *scm)
 			err = put_user(cmlen, &cm->cmsg_len);
 		if (!err) {
 			cmlen = CMSG_SPACE(i*sizeof(int));
+			if (msg->msg_controllen < cmlen)
+				cmlen = msg->msg_controllen;
 			msg->msg_control += cmlen;
 			msg->msg_controllen -= cmlen;
 		}
-- 
2.6.4


  parent reply	other threads:[~2016-01-05 18:11 UTC|newest]

Thread overview: 113+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-01-05 17:46 [PATCH 3.12 00/91] 3.12.52-stable review Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 01/91] ipv6: fix tunnel error handling Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 02/91] MIPS: KVM: Fix ASID restoration logic Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 03/91] MIPS: KVM: Fix CACHE immediate offset sign extension Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 04/91] MIPS: KVM: Uninit VCPU in vcpu_create error path Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 05/91] unix: avoid use-after-free in ep_remove_wait_queue Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 06/91] packet: do skb_probe_transport_header when we actually have data Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 07/91] packet: infer protocol from ethernet header if unset Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 08/91] sctp: translate host order to network order when setting a hmacid Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 09/91] snmp: Remove duplicate OUTMCAST stat increment Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 10/91] net: qmi_wwan: add XS Stick W100-2 from 4G Systems Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 11/91] tcp: md5: fix lockdep annotation Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 12/91] tcp: initialize tp->copied_seq in case of cross SYN connection Jiri Slaby
2016-01-05 17:45 ` Jiri Slaby [this message]
2016-01-05 17:45 ` [PATCH 3.12 14/91] net: ipmr: fix static mfc/dev leaks on table destruction Jiri Slaby
2016-01-05 17:45 ` [PATCH 3.12 15/91] net: ip6mr: " Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 16/91] broadcom: fix PHY_ID_BCM5481 entry in the id table Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 17/91] ipv6: distinguish frag queues by device for multicast and link-local packets Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 18/91] ipv6: add complete rcu protection around np->opt Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 19/91] net/neighbour: fix crash at dumping device-agnostic proxy entries Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 20/91] ipv6: sctp: implement sctp_v6_destroy_sock() Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 21/91] Bluetooth: ath3k: Add support of 04ca:300d AR3012 device Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 22/91] ARM: 8426/1: dma-mapping: add missing range check in dma_mmap() Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 23/91] ARM: 8427/1: dma-mapping: add support for offset parameter " Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 24/91] ARM: common: edma: Fix channel parameter for irq callbacks Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 25/91] x86/setup: Extend low identity map to cover whole kernel range Jiri Slaby
2016-01-06 10:47   ` Paolo Bonzini
2016-01-06 11:00     ` Matt Fleming
2016-01-06 11:24       ` Luis Henriques
2016-01-06 11:24         ` Luis Henriques
2016-01-06 13:31         ` Matt Fleming
2016-01-06 14:22           ` Luis Henriques
2016-01-06 14:22             ` Luis Henriques
2016-01-08 11:56             ` Matt Fleming
2016-01-08 13:36               ` Luis Henriques
2016-01-08 13:36                 ` Luis Henriques
2016-01-09  7:09             ` Jiri Slaby
2016-01-14 20:51             ` Kamal Mostafa
2016-01-05 17:46 ` [PATCH 3.12 26/91] x86/setup: Fix low identity map for >= 2GB " Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 27/91] x86/cpu: Call verify_cpu() after having entered long mode too Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 28/91] x86/cpu: Fix SMAP check in PVOPS environments Jiri Slaby
2016-01-05 17:46   ` Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 29/91] mac80211: fix driver RSSI event calculations Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 30/91] net: mvneta: Fix CPU_MAP registers initialisation Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 31/91] mwifiex: fix mwifiex_rdeeprom_read() Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 32/91] staging: rtl8712: Add device ID for Sitecom WLA2100 Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 33/91] Bluetooth: hidp: fix device disconnect on idle timeout Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 34/91] Bluetooth: ath3k: Add new AR3012 0930:021c id Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 35/91] Bluetooth: ath3k: Add support of AR3012 0cf3:817b device Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 36/91] can: sja1000: clear interrupts on start Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 37/91] arm64: Fix compat register mappings Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 38/91] usblp: do not set TASK_INTERRUPTIBLE before lock Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 39/91] usb: musb: core: fix order of arguments to ulpi write callback Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 40/91] USB: ti_usb_3410_5052: Add Honeywell HGI80 ID Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 41/91] USB: serial: option: add support for Novatel MiFi USB620L Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 42/91] USB: option: add XS Stick W100-2 from 4G Systems Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 43/91] ALSA: usb-audio: add packet size quirk for the Medeli DD305 Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 44/91] ALSA: usb-audio: prevent CH345 multiport output SysEx corruption Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 45/91] ALSA: usb-audio: work around CH345 input " Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 46/91] tty: fix stall caused by missing memory barrier in drivers/tty/n_tty.c Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 47/91] module: Call module notifier on failure after complete_formation() Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 48/91] netfilter: ipt_rpfilter: remove the nh_scope test in rpfilter_lookup_reverse Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 49/91] netfilter: ip6t_SYNPROXY: fix NULL pointer dereference Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 50/91] firewire: core: use correct vendor/model IDs Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 51/91] ip6mr: call del_timer_sync() in ip6mr_free_table() Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 52/91] Btrfs: fix race leading to incorrect item deletion when dropping extents Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 53/91] Btrfs: fix race leading to BUG_ON when running delalloc for nodatacow Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 54/91] ext4: fix potential use after free in __ext4_journal_stop Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 55/91] ext4, jbd2: ensure entering into panic after recording an error in superblock Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 56/91] firewire: ohci: fix JMicron JMB38x IT context discovery Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 57/91] nfs4: start callback_ident at idr 1 Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 58/91] nfs: if we have no valid attrs, then don't declare the attribute cache valid Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 59/91] ocfs2: fix umask ignored issue Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 60/91] USB: cdc_acm: Ignore Infineon Flash Loader utility Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 61/91] USB: serial: Another Infineon flash loader USB ID Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 62/91] USB: cp210x: Remove CP2110 ID from compatibility list Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 63/91] USB: add quirk for devices with broken LPM Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 64/91] USB: whci-hcd: add check for dma mapping error Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 65/91] usb: Use the USB_SS_MULT() macro to decode burst multiplier for log message Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 66/91] gre6: allow to update all parameters via rtnl Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 67/91] atl1c: Improve driver not to do order 4 GFP_ATOMIC allocation Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 68/91] sctp: use the same clock as if sock source timestamps were on Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 69/91] sctp: update the netstamp_needed counter when copying sockets Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 70/91] ipv6: sctp: clone options to avoid use after free Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 71/91] net: add validation for the socket syscall protocol argument Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 72/91] sh_eth: fix kernel oops in skb_put() Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 73/91] net: fix IP early demux races Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 74/91] vlan: Fix untag operations of stacked vlans with REORDER_HEADER off Jiri Slaby
2016-01-05 17:46 ` [PATCH 3.12 75/91] skbuff: Fix offset error in skb_reorder_vlan_header Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 76/91] pptp: verify sockaddr_len in pptp_bind() and pptp_connect() Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 77/91] bluetooth: Validate socket address length in sco_sock_bind() Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 78/91] af_unix: Revert 'lock_interruptible' in stream receive code Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 79/91] x86/setup: Do not reserve crashkernel high memory if low reservation failed Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 80/91] ahci: Add Marvell 88se91a2 device id Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 81/91] ahci: add new Intel device IDs Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 82/91] target/stat: print full t10_wwn.model buffer Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 83/91] RDS: fix race condition when sending a message on unbound socket Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 84/91] ALSA: hda - Disable 64bit address for Creative HDA controllers Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 85/91] i2c: i801: Add support for Intel Broxton Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 86/91] i2c: i801: add Intel Lewisburg device IDs Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 87/91] cdrom: Random writing support for BD-RE media Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 88/91] PM / devfreq: Fix governor_store() Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 89/91] PM / devfreq: Fix incorrect type issue Jiri Slaby
2016-11-12  3:02   ` Ben Hutchings
2016-11-12  4:11     ` Willy Tarreau
2016-11-12  4:11       ` Willy Tarreau
2016-01-05 17:47 ` [PATCH 3.12 90/91] gpio/omap: raw read and write endian fix Jiri Slaby
2016-01-05 17:47 ` [PATCH 3.12 91/91] HID: dragonrise: fix HID Descriptor for 0x0006 PID Jiri Slaby
2016-01-05 20:47 ` [PATCH 3.12 00/91] 3.12.52-stable review Guenter Roeck
2016-01-09  8:47   ` Jiri Slaby
2016-01-05 21:18 ` Shuah Khan
2016-01-06  7:37 ` Nikolay Borisov
2016-01-06  8:14   ` Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8478662197240c86bb81441f6f6f711b9d7a0e33.1452015822.git.jslaby@suse.cz \
    --to=jslaby@suse.cz \
    --cc=daniel@iogearbox.net \
    --cc=davem@davemloft.net \
    --cc=edumazet@google.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pageexec@freemail.hu \
    --cc=re.emese@gmail.com \
    --cc=spender@grsecurity.net \
    --cc=stable@vger.kernel.org \
    --cc=yongjun_wei@trendmicro.com.cn \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.