Received: by 10.223.185.116 with SMTP id b49csp4144725wrg; Mon, 19 Feb 2018 12:00:11 -0800 (PST) X-Google-Smtp-Source: AH8x225msr9BeHGR1ZtK8qmbQTtbtc23xvrxLUCQZjHKuRsdlsO6Gga9K7NFO3xT+3hsSFOlJHcZ X-Received: by 2002:a17:902:8a98:: with SMTP id p24-v6mr8856674plo.147.1519070411684; Mon, 19 Feb 2018 12:00:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519070411; cv=none; d=google.com; s=arc-20160816; b=Zaqf85SCBAKLy1xGkvYSS3HAMMCyKjFKk2wo80W4sj583vAqV4uejX2u6J6VE7w1dY YgQysRMs0/WSvXc0ADitvbevywr2QF7WEeNXIQpkVZMkDX9gWn1YbPIxICHzAUEv/gs5 pReNuxyBTWOy3fCKQmXGyFk3wq80CGG3fW+QvLQs3KvWIrERqtQuFzikV6+wvAjZtg0f vxxU3U4E5u6zQmhJW/p6hxQFDRers+QKPJeHsthmw1mzACdYtSgKa5FirLyml2JFy1zy VeK68bx9VsMXkPH1+D67KKJ/mwyX0a0LdHoeq1rJox+2gu8+lAHOc4LpWAVh4SXRoqwU trDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=SE7vWyAIXXfmRukYaNDNYycRwN1+aP2MrK5+GwZsRfk=; b=MxYC8oH5gwyXDOndUSbvOQ67nfGzkXYmPI/cXACrLXVXnowmIwufW0kB0YsrfRnyAE UaKmlwCbah3f8SvZdMDW+QQ+DUqwz4sqJKwRkm/61u2PmBq4BJRJ3ZzFQLhO8oaGM5qn CibjkRciFUUtPWT24Sjh029bPtKpwqY50JDlYXeb2HAR29Qu7ruOTZDRpUJsHUKoqeI9 lO63dyUqlzcJSf2zvzGNbnH5ZZIalBT0LvRCYp/LuafWtrizDG+ugFKJ4P+NK64O7ZKI ce1fZHNDGFhBFb+0x4/Mf2JakAfX7nJ7QXKfvJSgOi4kvPLiMf+csDjjHGJsbQWF/39B bXFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p64si5512751pga.789.2018.02.19.11.59.56; Mon, 19 Feb 2018 12:00:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753976AbeBST5D (ORCPT + 99 others); Mon, 19 Feb 2018 14:57:03 -0500 Received: from imap1.codethink.co.uk ([176.9.8.82]:50334 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753709AbeBSTqS (ORCPT ); Mon, 19 Feb 2018 14:46:18 -0500 Received: from host39-52-dynamic.55-79-r.retail.telecomitalia.it ([79.55.52.39] helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1enrOE-0006zR-34; Mon, 19 Feb 2018 19:46:18 +0000 Message-ID: <1519069573.3422.63.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 60/74] ipv6: fix udpv6 sendmsg crash caused by too small MTU From: Ben Hutchings To: Mike Maloney , Eric Dumazet Cc: stable@vger.kernel.org, syzbot , "David S. Miller" , Greg Kroah-Hartman , LKML Date: Mon, 19 Feb 2018 20:46:13 +0100 In-Reply-To: <20180129123850.261403857@linuxfoundation.org> References: <20180129123847.507563674@linuxfoundation.org> <20180129123850.261403857@linuxfoundation.org> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2018-01-29 at 13:57 +0100, Greg Kroah-Hartman wrote: > 4.4-stable review patch.  If anyone has any objections, please let me know. > > ------------------ > > From: Mike Maloney > > > [ Upstream commit 749439bfac6e1a2932c582e2699f91d329658196 ] [...] > --- a/net/ipv6/ip6_output.c > +++ b/net/ipv6/ip6_output.c > @@ -1246,14 +1246,16 @@ static int ip6_setup_cork(struct sock *s >   v6_cork->tclass = tclass; >   if (rt->dst.flags & DST_XFRM_TUNNEL) >   mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? > -       rt->dst.dev->mtu : dst_mtu(&rt->dst); > +       READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); >   else >   mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? > -       rt->dst.dev->mtu : dst_mtu(rt->dst.path); > +       READ_ONCE(rt->dst.dev->mtu) : dst_mtu(rt->dst.path); >   if (np->frag_size < mtu) { >   if (np->frag_size) >   mtu = np->frag_size; >   } > + if (mtu < IPV6_MIN_MTU) > + return -EINVAL; This error path appears to leak a reference to rt->dst. Ben. >   cork->base.fragsize = mtu; >   if (dst_allfrag(rt->dst.path)) >   cork->base.flags |= IPCORK_ALLFRAG; > > > -- Ben Hutchings Software Developer, Codethink Ltd.