Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp304543pxx; Wed, 28 Oct 2020 05:28:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxKyWOND+b2b92DRZbPt01Zg9HQtTb3NS2EW84aiejZ8TnyniD2939ifPG7nqCijh+zXJmm X-Received: by 2002:a17:906:3087:: with SMTP id 7mr2578694ejv.375.1603888139464; Wed, 28 Oct 2020 05:28:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603888139; cv=none; d=google.com; s=arc-20160816; b=vLszqh2O4El2INENQPv+rShLcwVnfHqB2DPBIRNacbZz3CXgiD/xsvlSLpk+snkMBU W9HODK3VRkrc2y8kFtbGbbiDCEj2jOWUFSR4ccM6ytnaaIFpUFt7nv8TO4qn1BW0f/bY QxFUFxuF2Zo+PCUth/ClPbQlXcHz/DmDLkcMizgBtIx15yPetWCTdRQOaxbryF+wIWmc jfDEyA2veRh+YxgPwoTF5vU+kUin6GEtcl1itSRBZdQak5o3UZbCcYH4/Ee8SWlAjBfB zQ+gaP8KA5OUYhwksBW9ZpuFUPJruKCA3O4rUqcM9/eBqbUS4H4/Qxcniae1x2SsuqLu 4oNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9LH5u++gJCn1SDPc40QSG9RbV/AFT6ycwxNDDQdXER8=; b=udKk1R0SSCCC4LyTXEJxcpfl26SP9VqhOv15uXGuMFyAoVHbIM65GbM6QB/3PbAkfj g59URUwWMjK58pdNh3uh4Qqn6XiY+xsyJ5C1kNVQSwxtAUFdT/NHIOulYIBz9y+7S0dO 5U4uhvrC6jWDaQF55qCNaPgg0e7dviChlx2t14Y7mWLGGBhka1PAUHac31GxRSPu2Z8G pgt9UopNGpeeQ9WFuYou0zUGw2TQa0AC44BKwbWFNT0nFgIcpwn4BqpNOMlQUca+MLX2 v6N+0qyODXxGfM7tzfSSTLKKOpi9WXIYC7UtagHpj2hBlCKbqmDKrmhIhMtQqp5JUXQB fDQQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="R/iaM31R"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g8si3473416ejm.389.2020.10.28.05.28.37; Wed, 28 Oct 2020 05:28:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="R/iaM31R"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1796999AbgJ0PVB (ORCPT + 99 others); Tue, 27 Oct 2020 11:21:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:55726 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1796411AbgJ0PSU (ORCPT ); Tue, 27 Oct 2020 11:18:20 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5D10022264; Tue, 27 Oct 2020 15:18:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603811889; bh=Wk6oyEMtaxZAZBQtmH1ud7Z24NCHUghIcxVPyF8m00Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=R/iaM31R8Tt7tiy+KQQZz01LnTy0R5KL5h/919vsR71G8Clb5UOpqFoiPzf3uVQJM kjPzyfHQgIzivaGS/r95ELg9uECIz7FcchQGdz5UNqMPrQy53U7lZe092YEC8fZPXZ Zlevql06OSE2mFW5FNH7SUJ2po3WvWZRZuh4MZxc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jon Maloy , Ying Xue , Cong Wang , Xin Long , Jakub Kicinski , syzbot+e96a7ba46281824cc46a@syzkaller.appspotmail.com Subject: [PATCH 5.9 019/757] tipc: fix the skb_unshare() in tipc_buf_append() Date: Tue, 27 Oct 2020 14:44:29 +0100 Message-Id: <20201027135451.412736737@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Cong Wang [ Upstream commit ed42989eab57d619667d7e87dfbd8fe207db54fe ] skb_unshare() drops a reference count on the old skb unconditionally, so in the failure case, we end up freeing the skb twice here. And because the skb is allocated in fclone and cloned by caller tipc_msg_reassemble(), the consequence is actually freeing the original skb too, thus triggered the UAF by syzbot. Fix this by replacing this skb_unshare() with skb_cloned()+skb_copy(). Fixes: ff48b6222e65 ("tipc: use skb_unshare() instead in tipc_buf_append()") Reported-and-tested-by: syzbot+e96a7ba46281824cc46a@syzkaller.appspotmail.com Cc: Jon Maloy Cc: Ying Xue Signed-off-by: Cong Wang Reviewed-by: Xin Long Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/tipc/msg.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/tipc/msg.c +++ b/net/tipc/msg.c @@ -150,7 +150,8 @@ int tipc_buf_append(struct sk_buff **hea if (fragid == FIRST_FRAGMENT) { if (unlikely(head)) goto err; - frag = skb_unshare(frag, GFP_ATOMIC); + if (skb_cloned(frag)) + frag = skb_copy(frag, GFP_ATOMIC); if (unlikely(!frag)) goto err; head = *headbuf = frag;