Received: by 10.213.65.68 with SMTP id h4csp4001064imn; Tue, 10 Apr 2018 07:48:52 -0700 (PDT) X-Google-Smtp-Source: AIpwx49bSpE2rU2BlequtoM/Z88xB4uXvdqc/gOUmtaRJpIIYSEA5dhjy5NQxHadRzpFzxq+lXpA X-Received: by 10.98.137.218 with SMTP id n87mr667654pfk.48.1523371732196; Tue, 10 Apr 2018 07:48:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523371732; cv=none; d=google.com; s=arc-20160816; b=cXXxswwifHWkhJv6DLc3zdza4wxZVQijJgrEL4uxzzF4TQkNx6nKg2mcRSjZumwQ92 1aLPNRbUh3FIpc4RyjHKavYBQ/aFIunIjL8MWF0tj4//dHrm9bsQnGUaagzqp/8HdUS0 XUdLB/TcMW+UuTiys1hlP2G1PmWSkPpa6Fm88fHSSIeRoejeuXdmUNrsQPLDE/0lBHqu xevT3QTGGD9XVD8oegq1d7GTmevEUbiXkpuioo30NErNpuDi9wZFsYHcv2IFptNngY2f KxxUIT4EsGjU5zZmeVrxAM6SEcOneJhT7ARe0U75DaNK1GNIjSWa3m+jVGsQgfalXD+1 hWvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=Wwn1YUzSpNh256KHxWTUB/JwROibx+AAnT090dZqxWg=; b=IXMDJnLNjKxQdZ7GGNE/WJpxG/PNyUqC4d33AIElLO/4GlbeV+qN/4MAvtnj2g+j6i InHiFVl+azUjjv9qpBuSgFOOV8Osc4GTQH8JTVweRMgiNdciaOoCIl8mWNm1LtyYmoMv X4EslOPZrPX9Idkp9h5bW3tNPay4jKFKRO/L4NnKhaYjRCL9ftmTqCSKb2xQKb8RUby0 dyAzECdc0+qOs63JCmGkNofHzdUpMHkum3EAzSCM7WQm2C70LUbMA8gZcS6hs5aQL5mE mKkgh+CRNAYx95VNn8ayH6E4VyG/V6mZBDGFBwLkqjoCsvv92i6/imgFJn2ivHZK1mVr K4Aw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r3si1929104pgf.125.2018.04.10.07.48.15; Tue, 10 Apr 2018 07:48:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754057AbeDJOpi (ORCPT + 99 others); Tue, 10 Apr 2018 10:45:38 -0400 Received: from h2.hallyn.com ([78.46.35.8]:56842 "EHLO mail.hallyn.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753423AbeDJOph (ORCPT ); Tue, 10 Apr 2018 10:45:37 -0400 Received: by mail.hallyn.com (Postfix, from userid 1001) id 1D769120296; Tue, 10 Apr 2018 09:45:36 -0500 (CDT) Date: Tue, 10 Apr 2018 09:45:36 -0500 From: "Serge E. Hallyn" To: Tetsuo Handa Cc: syzbot , "Serge E. Hallyn" , "Eric W. Biederman" , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, viro@zeniv.linux.org.uk Subject: Re: KASAN: null-ptr-deref Read in xattr_getsecurity Message-ID: <20180410144536.GA13386@mail.hallyn.com> References: <0000000000008d2e0d05697a693d@google.com> <9d192497-8b1e-ca8d-0ed8-b3324ee1e361@I-love.SAKURA.ne.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9d192497-8b1e-ca8d-0ed8-b3324ee1e361@I-love.SAKURA.ne.jp> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 10, 2018 at 07:13:23PM +0900, Tetsuo Handa wrote: > syzbot is reporting NULL pointer dereference at xattr_getsecurity() [1], > for cap_inode_getsecurity() is returning sizeof(struct vfs_cap_data) when > memory allocation failed. Return -ENOMEM if memory allocation failed. > > [1] https://syzkaller.appspot.com/bug?id=a55ba438506fe68649a5f50d2d82d56b365e0107 > > Signed-off-by: Tetsuo Handa > Fixes: 8db6c34f1dbc8e06 ("Introduce v3 namespaced file capabilities") > Reported-by: syzbot > Cc: stable # 4.14+ > Cc: Serge E. Hallyn Acked-by: Serge Hallyn thanks! -serge > Cc: Eric W. Biederman > --- > security/commoncap.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/security/commoncap.c b/security/commoncap.c > index 48620c9..1ce701f 100644 > --- a/security/commoncap.c > +++ b/security/commoncap.c > @@ -449,6 +449,8 @@ int cap_inode_getsecurity(struct inode *inode, const char *name, void **buffer, > magic |= VFS_CAP_FLAGS_EFFECTIVE; > memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32); > cap->magic_etc = cpu_to_le32(magic); > + } else { > + size = -ENOMEM; > } > } > kfree(tmpbuf); > -- > 1.8.3.1