Alexander Potapenko
dbc01c0a4e
tipc: fix an information leak in tipc_topsrv_kern_subscr
...
[ Upstream commit 777ecaabd6
]
Use a 8-byte write to initialize sub.usr_handle in
tipc_topsrv_kern_subscr(), otherwise four bytes remain uninitialized
when issuing setsockopt(..., SOL_TIPC, ...).
This resulted in an infoleak reported by KMSAN when the packet was
received:
=====================================================
BUG: KMSAN: kernel-infoleak in copyout+0xbc/0x100 lib/iov_iter.c:169
instrument_copy_to_user ./include/linux/instrumented.h:121
copyout+0xbc/0x100 lib/iov_iter.c:169
_copy_to_iter+0x5c0/0x20a0 lib/iov_iter.c:527
copy_to_iter ./include/linux/uio.h:176
simple_copy_to_iter+0x64/0xa0 net/core/datagram.c:513
__skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:419
skb_copy_datagram_iter+0x58/0x200 net/core/datagram.c:527
skb_copy_datagram_msg ./include/linux/skbuff.h:3903
packet_recvmsg+0x521/0x1e70 net/packet/af_packet.c:3469
____sys_recvmsg+0x2c4/0x810 net/socket.c:?
___sys_recvmsg+0x217/0x840 net/socket.c:2743
__sys_recvmsg net/socket.c:2773
__do_sys_recvmsg net/socket.c:2783
__se_sys_recvmsg net/socket.c:2780
__x64_sys_recvmsg+0x364/0x540 net/socket.c:2780
do_syscall_x64 arch/x86/entry/common.c:50
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd arch/x86/entry/entry_64.S:120
...
Uninit was stored to memory at:
tipc_sub_subscribe+0x42d/0xb50 net/tipc/subscr.c:156
tipc_conn_rcv_sub+0x246/0x620 net/tipc/topsrv.c:375
tipc_topsrv_kern_subscr+0x2e8/0x400 net/tipc/topsrv.c:579
tipc_group_create+0x4e7/0x7d0 net/tipc/group.c:190
tipc_sk_join+0x2a8/0x770 net/tipc/socket.c:3084
tipc_setsockopt+0xae5/0xe40 net/tipc/socket.c:3201
__sys_setsockopt+0x87f/0xdc0 net/socket.c:2252
__do_sys_setsockopt net/socket.c:2263
__se_sys_setsockopt net/socket.c:2260
__x64_sys_setsockopt+0xe0/0x160 net/socket.c:2260
do_syscall_x64 arch/x86/entry/common.c:50
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd arch/x86/entry/entry_64.S:120
Local variable sub created at:
tipc_topsrv_kern_subscr+0x57/0x400 net/tipc/topsrv.c:562
tipc_group_create+0x4e7/0x7d0 net/tipc/group.c:190
Bytes 84-87 of 88 are uninitialized
Memory access of size 88 starts at ffff88801ed57cd0
Data copied to user address 0000000020000400
...
=====================================================
Signed-off-by: Alexander Potapenko <glider@google.com >
Fixes: 026321c6d0
("tipc: rename tipc_server to tipc_topsrv")
Signed-off-by: David S. Miller <davem@davemloft.net >
Signed-off-by: Sasha Levin <sashal@kernel.org >
2022-10-29 10:12:55 +02:00
..
2021-03-17 11:51:04 -07:00
2021-03-17 11:51:04 -07:00
2021-06-28 13:31:57 -07:00
2020-06-17 08:53:34 -07:00
2022-06-14 18:36:13 +02:00
2021-04-07 14:29:29 -07:00
2022-06-29 09:03:22 +02:00
2021-05-18 13:22:09 -07:00
2022-03-08 19:12:30 +01:00
2020-12-01 15:37:41 -08:00
2022-10-29 10:12:55 +02:00
2020-08-03 16:21:46 -07:00
2020-11-27 17:34:01 -08:00
2020-11-27 17:34:01 -08:00
2020-08-16 21:04:55 -07:00
2022-03-16 14:23:38 +01:00
2021-05-18 13:22:09 -07:00
2022-09-15 11:30:05 +02:00
2021-06-28 13:31:57 -07:00
2021-06-28 13:31:57 -07:00
2022-02-16 12:56:30 +01:00
2020-12-01 15:37:41 -08:00
2022-03-02 11:47:56 +01:00
2021-06-03 14:06:39 -07:00
2021-05-18 13:22:09 -07:00
2020-09-07 12:08:53 -07:00
2021-03-11 18:06:54 -08:00
2020-09-18 13:58:37 -07:00
2022-07-07 17:53:28 +02:00
2020-09-18 13:58:37 -07:00
2022-08-03 12:03:51 +02:00
2020-10-30 08:19:18 -07:00
2021-06-10 13:48:43 -07:00
2021-03-29 16:28:50 -07:00
2020-09-18 13:58:37 -07:00
2022-10-29 10:12:55 +02:00
2020-12-01 15:37:46 -08:00
2021-05-17 14:07:48 -07:00