Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1220683yba; Tue, 2 Apr 2019 04:59:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqz7iEsxzB1ifGQ3kZiHT2Az8R2roXul1x5S24+eSAtw7HtooJ7D9BCWCUuhLnT4lE9Tw1Bv X-Received: by 2002:a63:30c5:: with SMTP id w188mr42163282pgw.76.1554206358466; Tue, 02 Apr 2019 04:59:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554206358; cv=none; d=google.com; s=arc-20160816; b=vn9WEz4AoHntyTgEVhj+Za0byor2zbiATtiKHZIRYAuoiGG8Cv5oDFNoxz0ysxmaDr rbvidQIfZm8IXC6FSTqd/N8BsTB54OQTDavdrirHbxlRqIrP5F344zu7v9960JpVj7KC OoNOd8PPai0jbRNT4nyPtfdfZMDQDLLJSZJk+qEU5uT/UI9mXjY9AeXWqYMTNQD0fhE8 ImtSp/RsAxP0WFDbAO3zZqmneTeplYD1a3RY7HV5B+/EzWqf/p7UTP/SHLTMrL8v6hP8 CgVnSTmGWHOJ57ggopVRdpinUggMwUr+dvdqSFimgNewl1kYAuCitYCIMMfjt07affoi Ie7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject :from:cc:to; bh=LVm0HaLZnG7SDfpCX5D3sDuXbyxEQKmxPqM/kOUHpW0=; b=O2KZRYysufzTdI0ZiEime9yC765eSl5m1XuC8PfDSONEJ80u3X3b2T6bc+ewYWn71w Tnp4NiyKmaRpr3mcCLE1d3SykSn3RQsb7Ue10czjV95xyO6HCuv5TvKtPCxEjDt96WOf 4z6wCgJn4xaMoCxMkeS/FZa67n4qq+s7+zxkesIB4NJe8GMt3ct5VAsJuQbm0F5E5BN8 QuVfIZL7vQHdaiK+vMaufdYAXB02lvfEHg+8MHVza1Sqr352haQXQnICmXce6/B1XJlO RdTkimWs+VyDR6ZbXlI3nGfRMVBhhwAw+nBmREXVdqjOzjR7YPYmehkaL90SXVh4d5lu uidw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q88si10971197pfa.222.2019.04.02.04.59.02; Tue, 02 Apr 2019 04:59:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730650AbfDBLia (ORCPT + 99 others); Tue, 2 Apr 2019 07:38:30 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:55600 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726930AbfDBLia (ORCPT ); Tue, 2 Apr 2019 07:38:30 -0400 Received: from DGGEMS406-HUB.china.huawei.com (unknown [10.3.19.206]) by Forcepoint Email with ESMTP id E0558CABE41BB83B77AC; Tue, 2 Apr 2019 19:38:27 +0800 (CST) Received: from [127.0.0.1] (10.184.191.73) by DGGEMS406-HUB.china.huawei.com (10.3.19.206) with Microsoft SMTP Server id 14.3.408.0; Tue, 2 Apr 2019 19:38:17 +0800 To: , , , , CC: , From: hujunwei Subject: [PATCH v4 net] ipv6: Fix dangling pointer when ipv6 fragment Message-ID: Date: Tue, 2 Apr 2019 19:38:04 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.184.191.73] Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Junwei Hu At the beginning of ip6_fragment func, the prevhdr pointer is obtained in the ip6_find_1stfragopt func. However, all the pointers pointing into skb header may change when calling skb_checksum_help func with skb->ip_summed = CHECKSUM_PARTIAL condition. The prevhdr pointe will be dangling if it is not reloaded after calling __skb_linearize func in skb_checksum_help func. Here, I add a variable, nexthdr_offset, to evaluate the offset, which does not changes even after calling __skb_linearize func. Fixes: 405c92f7a541 ("ipv6: add defensive check for CHECKSUM_PARTIAL skbs in ip_fragment") Signed-off-by: Junwei Hu Reported-by: Wenhao Zhang Reported-by: syzbot+e8ce541d095e486074fc@syzkaller.appspotmail.com Reviewed-by: Zhiqiang Liu Acked-by: Martin KaFai Lau --- V3->V4: - fix build warning net/ipv6/ip6_output.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/net/ipv6/ip6_output.c b/net/ipv6/ip6_output.c index edbd12067170..e51f3c648b09 100644 --- a/net/ipv6/ip6_output.c +++ b/net/ipv6/ip6_output.c @@ -601,7 +601,7 @@ int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, inet6_sk(skb->sk) : NULL; struct ipv6hdr *tmp_hdr; struct frag_hdr *fh; - unsigned int mtu, hlen, left, len; + unsigned int mtu, hlen, left, len, nexthdr_offset; int hroom, troom; __be32 frag_id; int ptr, offset = 0, err = 0; @@ -612,6 +612,7 @@ int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, goto fail; hlen = err; nexthdr = *prevhdr; + nexthdr_offset = prevhdr - skb_network_header(skb); mtu = ip6_skb_dst_mtu(skb); @@ -646,6 +647,7 @@ int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, (err = skb_checksum_help(skb))) goto fail; + prevhdr = skb_network_header(skb) + nexthdr_offset; hroom = LL_RESERVED_SPACE(rt->dst.dev); if (skb_has_frag_list(skb)) { unsigned int first_len = skb_pagelen(skb); -- 2.19.1