Shigeru Yoshida
33db24ad81
kcm: Fix memory leak in error path of kcm_sendmsg()
...
[ Upstream commit c821a88bd720b0046433173185fd841a100d44ad ]
syzbot reported a memory leak like below:
BUG: memory leak
unreferenced object 0xffff88810b088c00 (size 240):
comm "syz-executor186", pid 5012, jiffies 4294943306 (age 13.680s)
hex dump (first 32 bytes):
00 89 08 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff83e5d5ff>] __alloc_skb+0x1ef/0x230 net/core/skbuff.c:634
[<ffffffff84606e59>] alloc_skb include/linux/skbuff.h:1289 [inline]
[<ffffffff84606e59>] kcm_sendmsg+0x269/0x1050 net/kcm/kcmsock.c:815
[<ffffffff83e479c6>] sock_sendmsg_nosec net/socket.c:725 [inline]
[<ffffffff83e479c6>] sock_sendmsg+0x56/0xb0 net/socket.c:748
[<ffffffff83e47f55>] ____sys_sendmsg+0x365/0x470 net/socket.c:2494
[<ffffffff83e4c389>] ___sys_sendmsg+0xc9/0x130 net/socket.c:2548
[<ffffffff83e4c536>] __sys_sendmsg+0xa6/0x120 net/socket.c:2577
[<ffffffff84ad7bb8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff84ad7bb8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
[<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
In kcm_sendmsg(), kcm_tx_msg(head)->last_skb is used as a cursor to append
newly allocated skbs to 'head'. If some bytes are copied, an error occurred,
and jumped to out_error label, 'last_skb' is left unmodified. A later
kcm_sendmsg() will use an obsoleted 'last_skb' reference, corrupting the
'head' frag_list and causing the leak.
This patch fixes this issue by properly updating the last allocated skb in
'last_skb'.
Fixes: ab7ac4eb9832 ("kcm: Kernel Connection Multiplexor module")
Reported-and-tested-by: syzbot+6f98de741f7dbbfc4ccb@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=6f98de741f7dbbfc4ccb
Signed-off-by: Shigeru Yoshida <syoshida@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2023-09-19 12:20:29 +02:00
..
2021-09-15 09:50:34 +02:00
2023-09-19 12:20:04 +02:00
2023-01-14 10:16:18 +01:00
2023-05-30 12:57:53 +01:00
2021-04-07 15:00:08 +02:00
2023-06-09 10:30:12 +02:00
2022-06-22 14:13:17 +02:00
2023-08-30 16:23:16 +02:00
2023-09-19 12:20:08 +02:00
2023-01-14 10:15:31 +01:00
2021-07-14 16:56:29 +02:00
2023-07-27 08:44:39 +02:00
2023-03-17 08:45:11 +01:00
2023-07-27 08:44:35 +02:00
2023-08-30 16:23:11 +02:00
2023-09-19 12:20:26 +02:00
2023-08-11 11:57:50 +02:00
2023-09-19 12:20:22 +02:00
2023-06-21 15:45:38 +02:00
2023-07-27 08:44:10 +02:00
2023-01-24 07:19:55 +01:00
2023-09-19 12:20:29 +02:00
2022-11-03 23:57:51 +09:00
2023-09-19 12:20:29 +02:00
2023-09-19 12:20:26 +02:00
2023-03-22 13:30:00 +01:00
2023-09-19 12:20:29 +02:00
2023-08-26 15:26:51 +02:00
2023-04-26 11:27:41 +02:00
2022-04-27 13:53:50 +02:00
2023-07-27 08:44:40 +02:00
2023-05-30 12:57:53 +01:00
2022-12-14 11:32:01 +01:00
2023-02-22 12:55:58 +01:00
2023-04-26 11:27:41 +02:00
2023-05-17 11:48:10 +02:00
2023-09-19 12:20:27 +02:00
2023-09-19 12:20:05 +02:00
2023-07-27 08:43:43 +02:00
2023-09-19 12:20:10 +02:00
2023-07-27 08:43:43 +02:00
2023-05-30 12:57:52 +01:00
2023-02-22 12:55:57 +01:00
2023-08-16 18:21:01 +02:00
2022-01-11 15:25:01 +01:00
2021-03-07 12:34:07 +01:00
2023-04-20 12:10:26 +02:00
2023-03-11 16:39:26 +01:00
2023-02-22 12:55:53 +01:00
2023-05-17 11:48:11 +02:00
2023-09-19 12:20:26 +02:00
2023-09-19 12:20:25 +02:00
2023-09-19 12:20:29 +02:00
2021-11-18 14:04:27 +01:00
2023-08-30 16:23:09 +02:00
2023-08-11 11:57:37 +02:00
2023-05-30 12:57:46 +01:00
2023-09-19 12:20:26 +02:00
2023-05-30 12:57:52 +01:00
2023-08-11 11:57:47 +02:00
2023-02-15 17:22:15 +01:00
2023-07-27 08:44:09 +02:00
2023-08-26 15:26:52 +02:00
2021-06-18 10:00:06 +02:00
2023-06-21 15:45:38 +02:00
2023-06-21 15:45:38 +02:00
2023-09-19 12:20:06 +02:00