Received: by 10.223.185.116 with SMTP id b49csp1027400wrg; Wed, 21 Feb 2018 10:49:02 -0800 (PST) X-Google-Smtp-Source: AH8x2259spXNj2pdIfJ1DmewGKJuZaruFlaXQ+mDsmEE5/2qhcVxJLdMG8EHFI4P/mGltH+xb9PI X-Received: by 10.99.128.195 with SMTP id j186mr1637596pgd.15.1519238942271; Wed, 21 Feb 2018 10:49:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519238942; cv=none; d=google.com; s=arc-20160816; b=jX7E0PeLMEAyCnOxNYmmD3TFpLyHBU+2Ulque85Cb3ukmD8PodeFrHylclXijzNJOe 9m/77a/nJtC6FoMod9/+Oy2Y+BOjkrz11KuJD9plXQSXbCO8y89ZXOi/OcqcePRNbIxB JaDbMQwrA4pCxtSGiCjAKwZ43NdMi9p7fxFL/nryjQLqL8B9OP8MRBsJCcg8etiA8rPl +hP4nsvX9Zvu/bDEAux211LC0k4VW4UrkNxw09ee9A60LrtGQu+ueOJVyvv8mM+D7hZh yq0BN86I+ElejmNQY5meNoCk/TOJFz+cnPmzQJ6F5LeNSfDe9t41CQlPeKiktvOTeO4C L/IA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=++53kGK3rxUXgE6KAZtguoi0RVLPlZW9pxThL8AFoog=; b=AFH85irR0vrIPsoQv9HeCut2x3iPYUli+8zLPAwSW7o3Ng1BQLEm9aSBbTOXoU0Cpf M+iMUEXZpNIhUIwXIvWjQyX/oG1YHxU9ZPl36e65UybGct7JTrT/+EaG5sHwgO7ZB7MV XjWfCz9XpcXW2EyXnVlOnZ37Olp5cxJh/Yu9qLwAIbSVZH8c1kvXL8Hg8s0yUGN1B3L0 gF2Cxaoqlu9aw+AZyhTI0O6TyI/6uPfbhC0ZgqVsVxu99glfGHQHdlw7IdFhm+LHk5c9 mmdTlNx/b6UXMsmlLbrXhYgrXn5pY7boBIWekQGeK6oUHuxyJVe+uzBzPRk56NWFQPPj DsJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g3si9340163pfe.57.2018.02.21.10.48.48; Wed, 21 Feb 2018 10:49:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S937301AbeBUOBn (ORCPT + 99 others); Wed, 21 Feb 2018 09:01:43 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:39506 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933192AbeBUNDT (ORCPT ); Wed, 21 Feb 2018 08:03:19 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 873E510C9; Wed, 21 Feb 2018 13:03:18 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "David S. Miller" , "Eric W. Biederman" , Dan Williams Subject: [PATCH 4.14 123/167] mpls, nospec: Sanitize array index in mpls_label_ok() Date: Wed, 21 Feb 2018 13:48:54 +0100 Message-Id: <20180221124531.269341715@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180221124524.639039577@linuxfoundation.org> References: <20180221124524.639039577@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dan Williams commit 3968523f855050b8195134da951b87c20bd66130 upstream. mpls_label_ok() validates that the 'platform_label' array index from a userspace netlink message payload is valid. Under speculation the mpls_label_ok() result may not resolve in the CPU pipeline until after the index is used to access an array element. Sanitize the index to zero to prevent userspace-controlled arbitrary out-of-bounds speculation, a precursor for a speculative execution side channel vulnerability. Cc: Cc: "David S. Miller" Cc: Eric W. Biederman Signed-off-by: Dan Williams Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/mpls/af_mpls.c | 24 ++++++++++++++---------- 1 file changed, 14 insertions(+), 10 deletions(-) --- a/net/mpls/af_mpls.c +++ b/net/mpls/af_mpls.c @@ -8,6 +8,7 @@ #include #include #include +#include #include #include #include @@ -904,24 +905,27 @@ errout: return err; } -static bool mpls_label_ok(struct net *net, unsigned int index, +static bool mpls_label_ok(struct net *net, unsigned int *index, struct netlink_ext_ack *extack) { + bool is_ok = true; + /* Reserved labels may not be set */ - if (index < MPLS_LABEL_FIRST_UNRESERVED) { + if (*index < MPLS_LABEL_FIRST_UNRESERVED) { NL_SET_ERR_MSG(extack, "Invalid label - must be MPLS_LABEL_FIRST_UNRESERVED or higher"); - return false; + is_ok = false; } /* The full 20 bit range may not be supported. */ - if (index >= net->mpls.platform_labels) { + if (is_ok && *index >= net->mpls.platform_labels) { NL_SET_ERR_MSG(extack, "Label >= configured maximum in platform_labels"); - return false; + is_ok = false; } - return true; + *index = array_index_nospec(*index, net->mpls.platform_labels); + return is_ok; } static int mpls_route_add(struct mpls_route_config *cfg, @@ -944,7 +948,7 @@ static int mpls_route_add(struct mpls_ro index = find_free_label(net); } - if (!mpls_label_ok(net, index, extack)) + if (!mpls_label_ok(net, &index, extack)) goto errout; /* Append makes no sense with mpls */ @@ -1021,7 +1025,7 @@ static int mpls_route_del(struct mpls_ro index = cfg->rc_label; - if (!mpls_label_ok(net, index, extack)) + if (!mpls_label_ok(net, &index, extack)) goto errout; mpls_route_update(net, index, NULL, &cfg->rc_nlinfo); @@ -1779,7 +1783,7 @@ static int rtm_to_route_config(struct sk goto errout; if (!mpls_label_ok(cfg->rc_nlinfo.nl_net, - cfg->rc_label, extack)) + &cfg->rc_label, extack)) goto errout; break; } @@ -2106,7 +2110,7 @@ static int mpls_getroute(struct sk_buff goto errout; } - if (!mpls_label_ok(net, in_label, extack)) { + if (!mpls_label_ok(net, &in_label, extack)) { err = -EINVAL; goto errout; }