Received: by 10.213.65.68 with SMTP id h4csp4003751imn; Tue, 10 Apr 2018 07:51:27 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+Q8J82BHoLqMrYQpsykfdik/8+wiaoAoV9oQdxXctaXg4Kx8VVUHiu/83gBydIfG9rdZQo X-Received: by 2002:a17:902:579d:: with SMTP id l29-v6mr771976pli.163.1523371887747; Tue, 10 Apr 2018 07:51:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523371887; cv=none; d=google.com; s=arc-20160816; b=cxZ+QU41zyTI6IuNgXwWID9VN0amXPRjAcIeXvwfsMT9dXnl8dI4Xrh5qptqf51y9R 0FIatNHQ27pAEVBN1FANlvaI9EmCaaTL3IBP/Oihvx3Wf/wIlmr/qonjH49DCfW1GwZN Yvv4gN8QUqSj7dNgRFEKXbqfj4NRZqimr0NiRGga/Rfwsp7/b8ZzjhYT3g+aSMCg6wUk pV7kecE1T7SGDlF6/hs46fULE7nLGZ4czbSDhxxnUHxVvOWcruOAMvPZnbjSUnbIMgSO upfJzG8pkVEGixkTk9Y5VaUECmhg6baUQ2MumOA9fs/Fvaok0uMBOXaHcden1uI/b+zz Y0Ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=i3xWWL0eyIk0uIDxNETbQw3FcgY6BtG9cEPMiwTL1zw=; b=c14EMgZy1WQ2nbi5pOAtl4yZJaIyHdpWzdiyz5a10iDyD4ZuE9wBu1a5/f4YSEduO6 D+kDvuimAbxLMWIZpMsZVSVN/Kw98atVsmo8cYIVCVHLhAYV1w1MXtA0g7+HTfdspG8m QXZxe5FDIsdETJ3mPxvajyfpqYWXNhvmGE3EWOD0vY7az/ToIn+EDK0bfZtza9BRZEJn xSw5bUFk32XJsSyacifHddE7sgbH0SQKm6yGGeCSgTJ/cgKo+mAjupTpYFLHb4YZ+KmA SPUTYEyFbVChTCpo1guaAhlgxz9EeQ9zahYpPIwuLTIj/fvSGUmxWdCIWFpxtMXpxUm8 bGbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c15si1896517pgu.312.2018.04.10.07.50.50; Tue, 10 Apr 2018 07:51:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754165AbeDJOsQ (ORCPT + 99 others); Tue, 10 Apr 2018 10:48:16 -0400 Received: from h2.hallyn.com ([78.46.35.8]:56932 "EHLO mail.hallyn.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753580AbeDJOsO (ORCPT ); Tue, 10 Apr 2018 10:48:14 -0400 Received: by mail.hallyn.com (Postfix, from userid 1001) id A7E34120296; Tue, 10 Apr 2018 09:48:12 -0500 (CDT) Date: Tue, 10 Apr 2018 09:48:12 -0500 From: "Serge E. Hallyn" To: "Eric W. Biederman" Cc: Tetsuo Handa , syzbot , "Serge E. Hallyn" , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, viro@zeniv.linux.org.uk, linux-security-module@vger.kernel.org Subject: Re: KASAN: null-ptr-deref Read in xattr_getsecurity Message-ID: <20180410144812.GB13386@mail.hallyn.com> References: <0000000000008d2e0d05697a693d@google.com> <9d192497-8b1e-ca8d-0ed8-b3324ee1e361@I-love.SAKURA.ne.jp> <87o9irw2ad.fsf@xmission.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87o9irw2ad.fsf@xmission.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 10, 2018 at 09:42:50AM -0500, Eric W. Biederman wrote: > Tetsuo Handa writes: > > > From 904d07a6eb014f3df0c5a1ebfcfd4323276a9a76 Mon Sep 17 00:00:00 2001 > > From: Tetsuo Handa > > Date: Tue, 10 Apr 2018 15:15:16 +0900 > > Subject: [PATCH] commoncap: Handle memory allocation failure. > > > > syzbot is reporting NULL pointer dereference at xattr_getsecurity() [1], > > for cap_inode_getsecurity() is returning sizeof(struct vfs_cap_data) when > > memory allocation failed. Return -ENOMEM if memory allocation failed. > > > > [1] https://syzkaller.appspot.com/bug?id=a55ba438506fe68649a5f50d2d82d56b365e0107 > > Acked-by: "Eric W. Biederman" > > Tetsuo I can pick this up, or do you have preferred path for getting > this change merged? > > Serge does this fix look ok to you? I am a bit worried that yup, looks good to me. would have replied an hour or two ago but lacked an lkml-acceptable mailer :) thanks, serge > might be a bit brittler but I don't see any issues with this change. > > Eric > > > > Signed-off-by: Tetsuo Handa > > Fixes: 8db6c34f1dbc8e06 ("Introduce v3 namespaced file capabilities") > > Reported-by: syzbot > > Cc: stable # 4.14+ > > Cc: Serge E. Hallyn > > Cc: Eric W. Biederman > > --- > > security/commoncap.c | 2 ++ > > 1 file changed, 2 insertions(+) > > > > diff --git a/security/commoncap.c b/security/commoncap.c > > index 48620c9..1ce701f 100644 > > --- a/security/commoncap.c > > +++ b/security/commoncap.c > > @@ -449,6 +449,8 @@ int cap_inode_getsecurity(struct inode *inode, const char *name, void **buffer, > > magic |= VFS_CAP_FLAGS_EFFECTIVE; > > memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32); > > cap->magic_etc = cpu_to_le32(magic); > > + } else { > > + size = -ENOMEM; > > } > > } > > kfree(tmpbuf); > > -- > > 1.8.3.1