Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751648AbdISVyi (ORCPT ); Tue, 19 Sep 2017 17:54:38 -0400 Received: from mail-cys01nam02on0103.outbound.protection.outlook.com ([104.47.37.103]:38592 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751503AbdISVyg (ORCPT ); Tue, 19 Sep 2017 17:54:36 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=meng.xu@gatech.edu; Subject: Re: [PATCH] hid/uhid: fix a double-fetch bug when copying event from user To: Dmitry Torokhov , Meng Xu Cc: dh.herrmann@googlemail.com, Jiri Kosina , Benjamin Tissoires , "linux-input@vger.kernel.org" , lkml , sanidhya@gatech.edu, taesoo@gatech.edu References: <1505798497-22436-1-git-send-email-mengxu.gatech@gmail.com> From: Meng Xu Message-ID: <4703026b-a8ea-20f3-ac8c-93bee6cba8dd@gatech.edu> Date: Tue, 19 Sep 2017 17:54:29 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Originating-IP: [143.215.130.72] X-ClientProxiedBy: DM5PR04CA0060.namprd04.prod.outlook.com (10.172.183.150) To BN3PR0701MB1736.namprd07.prod.outlook.com (10.163.39.23) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 77f49a41-9ae1-403e-9946-08d4ffa903a7 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(300000503095)(300135400095)(2017052603199)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);SRVR:BN3PR0701MB1736; X-Microsoft-Exchange-Diagnostics: 1;BN3PR0701MB1736;3:85/TXNe8thTAXauME6fyMpXU0YKr7GbOilWGB1Q2V+d2nFptXyLO4eBKD2Kn9ZZl/c/n9sUeCJvLqgJoxllffjLwTdMhv3wxTe55XpBZSLwm5g5fbFL7JdZdkNj+9vG1ceVcrHaQYpJ1ipKzIY6eermiViRfKDPcUbOdTSH7Tp962eqgVIImCUQmRbU6JdtK0zixDD0IZ8OlKdnNfKigdw3cmhk//Hp6q/OhqsczAC2AcOArsxppOAMW3a0knCcO;25:FkyMdGegKpSw7aWUP5nbt/8WKYJknICsUCdZtpTwW2uApyejTHzMvM+fog2fzyjv9+yIK5KeqfN7wdDdOf2jn2Y17yaXr9rBTPELaeO//pOCi1dtgC0RPmfwSUXR6KbKs0pBapIaAizLiUF3LSAET/j5wqLu6+Xn88nFbOHU9P8i+FCOjcBOZWpJg1j6/SlahlAXpQbvdGCR46ZxoATZ6oIYBMhEcRS5K2VWASXHiJQdjkPUswJW3GB/2F2WTst5EkW0syLxivhIbc3Bybox2I1pfyBrqUNk+BK4XUrUw+M+QYhD3CMorxYzfRLmgN1jR9lohEnALvTe1KH8qsVJmQ==;31:gQmDfFhL9qYIxq5YcwF+pmT9KGWUyxfmtzo7FjCE23+/kw9owd1GWfgJp0eC7ley7SG2mAlKHhPISciq9QHF1tQLHWptgPJccvYECIi5aFG9egULt72iU+TdpM/qv7PMA2+0ZGsCQMadYjxyTz+tqdnKNQvbC+8d9hW3s2u92jnc+7S4WmiBLXzY6DaFOEv1y6GwANc31JgkcG+1PavXwOX9Ektt5YG55H8OuwGoGPA= X-MS-TrafficTypeDiagnostic: BN3PR0701MB1736: X-Microsoft-Exchange-Diagnostics: 1;BN3PR0701MB1736;20:4nwOm4ok7v3cNzlQet31ejFGCaO3nYkrDuJ///A2ovfb9p40H0YLlb7Ks+Y6FpkKjJIoy0+QNmwcDxzYD5fiVp8iV1sVhlAXcXNPQKdSBmvgZ91c7OpEDBAQt3+6Lk7UsnDW8tNi5f42DAnyBfeEEg/jRf963f/KAPk328XDQB0Zuw73k4DLQkCLDTOfw4422SLS/PBz3TOf6KkxMuuXo9LUDu9j/8AQ98DilXv1Mi4vDHXWWLYAGAKN0wNO+zY+bQQgjf1XPVZrMunTq7dm0ae05o7IlKHec/E/o50fB0AOgUR+kpxICEECabqHAtbpBuTzV8lXtm/74lHiaJHYpg==;4:xgK7cKO6pNhSV/Um5A5rwOsVOeJ///uJWE0yRt9ebHGXBCrB1xquVMXJwnMpE4utZO04dnlyg4qnl2qWCKpyB84jU1bXGiQjL87D55ylDdkYavcDkHE+0DJw9gc/5Ppr8NoT+x3YnzXqgdikHLozlE6KLfctXn65+djuq1ajx3T4kbv5DAGsAQsNDg9/dOyd+PokbQLC95ySrLLUDhVVUQTQlmGkiIcQ8f2YtUEALNau0/woZXYy82Ky4ZQhbJoMlLIR9Ok99QBkDl9XbsYsX46/Y6cWr147MLCh/5J76iI= X-Exchange-Antispam-Report-Test: UriScan:(788757137089); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(3002001)(6041248)(20161123562025)(201703131423075)(201702281529075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123558100)(20161123560025)(20161123555025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:BN3PR0701MB1736;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:BN3PR0701MB1736; X-Forefront-PRVS: 04359FAD81 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(6049001)(6009001)(346002)(376002)(24454002)(377454003)(189002)(199003)(107886003)(65826007)(76176999)(6486002)(90366009)(305945005)(6246003)(8676002)(50986999)(5660300001)(86362001)(75432002)(8936002)(7736002)(81156014)(81166006)(54356999)(68736007)(39060400002)(189998001)(2950100002)(229853002)(36756003)(6666003)(101416001)(4326008)(53936002)(31686004)(31696002)(88552002)(65806001)(230700001)(66066001)(65956001)(49976008)(64126003)(478600001)(53546010)(110136005)(3846002)(23676002)(16576012)(97736004)(16526017)(58126008)(6116002)(786003)(316002)(47776003)(83506001)(105586002)(106356001)(50466002)(25786009)(33646002)(54906003)(2906002)(3940600001);DIR:OUT;SFP:1102;SCL:1;SRVR:BN3PR0701MB1736;H:[143.215.130.72];FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjNQUjA3MDFNQjE3MzY7MjM6Qk03VloydW5OaEFwVFhNNHJOdXFjdy9v?= =?utf-8?B?Z09PekpIQWhlU2NsbVh3WGpHd2JXaW9scGNzWUJuekJ1dmpoRXQ4UTVJTjVq?= =?utf-8?B?L0NzRUtNUmU4OEhaaGptdGlUUjJ5YUVHeFduNWhpUFo3SUdRUmNsQzB0bG1n?= =?utf-8?B?NWd0V2xsWElxSjE1T29ob0lLajRnRW95bzBpejVPTHlGQ0tGRXpFdkZHdHhu?= =?utf-8?B?ZHlLc0E3b1FENVJiYkxpT1B6TjAzMTZCM3FTTHFSYm52VEl2UFhWdkJiL2Ez?= =?utf-8?B?aVNRUWZYK2l3QUMxVGwrdDVSRmlzYVM0UEpRYWhBay9BODJudnJPeGJGMkFV?= =?utf-8?B?YXZwREtMVDVDQTlOSlhxMEdDTzdFSmFIQk9nbVBtQ3hnMG5tckxjL3F1MkIx?= =?utf-8?B?bmc5TzN3b3oxYlBxZFA5dmNPSXBxQitTVUE3cWdNV2FqdmM4VTJFNWtoTm1K?= =?utf-8?B?WVBMVnRDSndmcnFYYnhWbmdaU1RPRjdnL2xpR3NQUThaNURsYVFCeEhVSFQ0?= =?utf-8?B?dUZXSkROc0N3VmNqR3NXUDAyU096NW56dnpSQTVnaVJodFNOb0Q5andZbFhP?= =?utf-8?B?eHJVaWJQMGxFVjVHWi9wSGx5Tk5rV1lBVmdEaDRWWEdLVmxDVjJHbGFodkc3?= =?utf-8?B?T25vRDQzTDFKUmVTazdaTTVoOWdOcENIdXh3R21uQ08xcEJLRFkrL3V5cmIr?= =?utf-8?B?ZVE4dFY4UUVJd0psK3ZNWEpFK3JKSjBkNm8vMkF0dzRmTmVEMUc2NmZqOWpJ?= =?utf-8?B?L0lzeXlpT0lDL2x2cFJ3MGpaaFpSMG9UVllza3dyVWNWakdYbG95UnlsZDYw?= =?utf-8?B?MlY0S3BmL3ByRVgvNGpBWVA2bC9tMlVSTzRVL2YvdUY5c2ErVy91bDdMOUtO?= =?utf-8?B?TmFxWGlYWURabkZaSTdhL2JYZEVTNUZyRWUrKzcvVjg1UHlBSThhdWpWUmI1?= =?utf-8?B?U0FzOFhCSWFQSWxjc0hMRSswTDhXc3ZCVEhjSXF3TDRhMjNnaGM2eENIU3hl?= =?utf-8?B?bHE3MkU5WUVYSzlyN0dRdllpaEx0Q3FZTlZEZDVyR0lMeFVXanBKdjBMNFNQ?= =?utf-8?B?QmlNVVBNYUtVL2lLeElxNUN6ci85WkQxM3FTMW0xUkxIaGpibEx6djh4S3Nj?= =?utf-8?B?U1RlZERKLy9GdVpNZFpXbmdqYVlWdzd5dmcwN1orYTUrSm5TM2FIMTRkMnRU?= =?utf-8?B?S0ZEd1oyTGlpb08zTHBNdStWc2s4L0FKcWgyTjJXMSsxNGRoUVJtNXl4eGRH?= =?utf-8?B?azdMUys2RFF4WlhaejRRaVZqdlBYbVFaMHV3M2J2THFLNE1QSzg1ZFkxU2dt?= =?utf-8?B?YUJud091bFZobHVRZml0K3ZoTVI3TGo1Um12aE53UlZndXd3MGltS1ljRXVF?= =?utf-8?B?ZDZ6UTRhM0RwVWVSdVAvOFV5MGoySlN2ZXVET1IzMWVkUC8yOWgxcDQ4WU5m?= =?utf-8?B?S3N3bjE2aWo3QlBybU83dHp6L2NKbVVSYWRKNDU1Z1REN3JvYTNDSTEwZERP?= =?utf-8?B?am9tek1teDhZbndiNTNFVHVBbHkvNUtnbUR1Q1JhdU4yTTZubnc3MmIyVjdt?= =?utf-8?B?b3htVEJhcHkzWm5iWTRnQWFsMExZNUllTHhyZUtvVUwvVmNsUFJ1TVFwRjZE?= =?utf-8?B?TVg2RHJSbUFvZ25XTnhsdnFFVlhCb3NGcWN1SmlRWGwrRjRWRkcvVk5oUklx?= =?utf-8?B?RStOQlhNOG12UUJ3cFN3VXVKRzJKOCtxTGdZUjJmWmdoYjJ1Y1FEZG5XU0dV?= =?utf-8?B?TlJUclpnMmhPdFFsa1hpR0Nlc25XR1FaVjBhZFA1KzdlNEhZRUwwUEI1NFRZ?= =?utf-8?B?MlF4ZkRnSk44YllpS3ZETyt0KzFheEtPYTllTk9JcDVxcUl1emFIUEFzRTMr?= =?utf-8?B?Q2FIeUNWb2pmdVUvSXhlR3E1Z0VMYnlpbjYxZ0tORGJRb016NFFuZG1xTGhw?= =?utf-8?B?N0pUb1Y1bnlGRVIwWXN5STZOLzRNOE9US0JpakZqeUgxUC9Hbnd3R3Zadk5x?= =?utf-8?B?dG5qTHV0L290b2toT3lCQlpkZmx6T3NYc0Jra3VLM0s2REJWYVhUM0pxK3JY?= =?utf-8?Q?A1xNP4=3D?= X-Microsoft-Exchange-Diagnostics: 1;BN3PR0701MB1736;6:mvbgz65XRhXlBRoNSY6UTkftEoK0n6zC7nt1wE6CXI1cLLnZHrxSPzivVP3elLHdMqPI0Jti/kSbFBYSnoYERAo5uGh+8EA26k15IfGczyyijTHMsrcxZ8wkWxLF65aYuQBdxPR6mvCRswWBe1FFUkaQW82dAjCglI5jNNdUPHvJrvyMQ0LOiG9sIB5m0MaqmkTuAVxQonwIJuMA6FJZwCRH/N/LzppcED9FRhEPl+sVRRLFVcrN4cHj/ObBuNiZZGNOCwKa986l0LuNlRdHgkKY0Y3pJGclK/S6a1Erj2ZM0ae+r2Iv1K+vXE979mOOurp7pYehySk+zsA3mqlO6Q==;5:dP1Jd8FAoux0a0NDdmx+M6KiN1z6VdDoWDIC2BKHNR7VwgI1vsTZECLuZem/YqQpNzuZNZYDbIFEGCgT8uw9tSG2acUnGMbAnAxiqCcvxoDHrBeSS0/2gS8RgaaoTvLmZac4tf6W1KnZWYmJkfVeRg==;24:GuaedO/ImGGDBz4QgTJyvqynsa6NU+8xzOdAkVFP5UB4ybyQz+CLN3xOuRzgfzzEgGKyVSPOUwh/l4kYTq55qr/59n3HFxZRkoolC3eD3Js=;7:5j6x2Vq10y/DomMSHRkwUK6CPEuEfiIxmDC5lEPr3wZMUF63pHArwQnd43/YTfPlN0vjiYu1urabHuHZFphYVWeOBr/aQBrZTicFTK3YreOIB0nL7zrrxkjvkYJmSsQ0UxYiOlqIN7/7M6ZOYG6Usngf2GKAHiIy7qoeVL/Iw5lVfxZo3gi+9Bxx67ZmXbqc1a+bvGK993+XpiM/rnQzcb4F2LOkvJhq4U7wZZe1sV4= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: gatech.edu X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Sep 2017 21:54:33.2578 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 482198bb-ae7b-4b25-8b7a-6d7f32faa083 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR0701MB1736 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3511 Lines: 83 On 09/19/2017 05:31 PM, Dmitry Torokhov wrote: > On Mon, Sep 18, 2017 at 10:21 PM, Meng Xu wrote: >> When in_compat_syscall(), a user could make type != UHID_CREATE when >> get_user(type, buffer) [first fetch] and later make event->type == >> UHID_CREATE in copy_from_user(event, buffer, ...) [second fetch]. >> >> By doing so, an attacker might circumvent the specific logic to handle >> the type == UHID_CREATE case and later cause undefined behaviors. >> >> This patch enforces that event->type is overriden to the type value >> copied in the first fetch and thus, mitigate this race condition attack. > I do not believe this mitigates anything, as copy_form_user() is not > an atomic operation and we can have 2nd thread "scrambling" the memory > while 1st does the ioctl. Yes, what you described is the root cause of this double-fetch situation and that is why I am proposing this patch. > > We also should not expect that we always get consistent data from > userspace and the rest of the driver should be able to cope with > (reject) such data. Yes, that is also true and we should never assume to get consistent data from userspace. That is why in this case, we can have user started with UHID_INPUT just to skip the large chunk of code in if (type == UHID_CREATE) {} and then replace it with UHID_CREATE and take the function uhid_dev_create(uhid, &uhid->input_buf). This is exactly what this patch tries to mitigate. >> Signed-off-by: Meng Xu >> --- >> drivers/hid/uhid.c | 15 ++++++++++++--- >> 1 file changed, 12 insertions(+), 3 deletions(-) >> >> diff --git a/drivers/hid/uhid.c b/drivers/hid/uhid.c >> index 7f8ff39..4bbfd8a 100644 >> --- a/drivers/hid/uhid.c >> +++ b/drivers/hid/uhid.c >> @@ -448,11 +448,20 @@ static int uhid_event_from_user(const char __user *buffer, size_t len, >> kfree(compat); >> return 0; >> } >> + >> /* All others can be copied directly */ >> - } >> + if (copy_from_user(event, buffer, min(len, sizeof(*event)))) >> + return -EFAULT; >> >> - if (copy_from_user(event, buffer, min(len, sizeof(*event)))) >> - return -EFAULT; >> + /* >> + * Override type in case the user process rushes to change it >> + * between two fetches >> + * */ >> + event->type = type; > So if we started with UHID_INPUT, userspace replaced it with > UHID_FEATURE, we clobber the type UHID_INPUT leaving the rest of the > structure holding the new data and call it a day? That does not make > any sense to me. I am not a maintainer so I am not in a position to judge which function should do the input validation. But to me, given how uhid_char_write() and uhid_event_from_user() are structured, If we started with UHID_INPUT and later userspace replaced it with UHID_FEATURE, it should be validated by uhid_dev_input. If this patch, i.e., overriding event->type = type, is not satisfactory to you, how about we change it to a sanity check? Like if (event->type != type) return -EFAULT By doing so, we make sure that if there is another thread "scrambling" the memory, we simply do not proceed. > >> + } else { >> + if (copy_from_user(event, buffer, min(len, sizeof(*event)))) >> + return -EFAULT; >> + } >> >> return 0; >> } >> -- >> 2.7.4 >> > Thanks. >