Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp610852pxx; Wed, 28 Oct 2020 12:21:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxWC0cxnPQxuF1kPyUA3mh+Fmdy7AvLn2DDfMMLi+4040iB+IS7QlmDMszo+rDhNMIAT0HB X-Received: by 2002:a17:906:8058:: with SMTP id x24mr646617ejw.272.1603912877972; Wed, 28 Oct 2020 12:21:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603912877; cv=none; d=google.com; s=arc-20160816; b=sDJ/xySbssUXzgGY6LmkYrAOPsFcyhRSlKxVzqYYp/Zzl0QCUMYqy1+M+B7KTFUwez nrVs7vbLw/abXf0H+pcdQxMi49AkPoO3LzNT4H37V/FDO6P5QA/5ehN7dj0heY6yV9yW Uca2q0+Vu7i/yqH6a+zEP4W5bmKG2pmbOx4SN8PV9pbUf6pG9cy1jaSk/Rlm1AaUuJAl PrILNUrNEJOTElW1OyO16OT0idUS4eJb20/sSxpqAiI/NvWMUGHHXzj8lLXPST4ndKqo NWlyNRIzUhi9YYh70ZkQnFvvL2dGtOVUm7wmDhXSnpiSn+lT0OpSgjhXakCQHO4R+JaL v7iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=gPEY5IzIBbgZCwX/WBgYJDB5cZVslJkMzRnj3jKECj0=; b=x9/HGRCAHKGkHLW5/4Sj0ctYOGvYq9ATRliExO9217flFn3UUOXRRQnFTa6Wg553MT iCht+QZ//RfGHR+u96hmuAwQDFaXM1MufEmH0PuwdGVZX+ltyJtOZiCCDr8yVk4ftz3b IvbiOOlSEM6/Povqf+i7qMJ4428E9sLW8XYotzdCphZBS8TfBHZEDCBLGYI9fvJTrs00 X/vt1lol/aPTUUdukPSUGMyexuTIRSq+DV9AcJbJAATsdvQWrmJbaegPIGO4MR6v3x7/ BbgjAiZXXIdnm1ULLtTNmdclocXOIFIoyIk4zTsNmWyGULWoKTdADRc5vk3r6i4AQecN yTmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nsfO695P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w23si165eds.571.2020.10.28.12.20.55; Wed, 28 Oct 2020 12:21:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nsfO695P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1827266AbgJ0SWk (ORCPT + 99 others); Tue, 27 Oct 2020 14:22:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:50310 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753143AbgJ0OC2 (ORCPT ); Tue, 27 Oct 2020 10:02:28 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4B6982222C; Tue, 27 Oct 2020 14:02:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603807347; bh=Noym+lf8cZ47Ly+mv+s8DXWgLUwSiQZUDXTZQt2zu7A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nsfO695P9Qw77A36GtKcSFJPBnfscrys34jFxZ76vba7yzEERX8r7oH0tjGBcQhCP TwXDyVRrJtaiJocZTG5yVtWbEBmwcW+0tDIbXaSfPfu2bmHuAi7cxPZnKmoNtpqdeP gg3q5q7Ds5FvGUCvrIwivtptb05c1oLs7oIA9jt8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jon Maloy , Ying Xue , Cong Wang , Xin Long , Jakub Kicinski , syzbot+e96a7ba46281824cc46a@syzkaller.appspotmail.com Subject: [PATCH 4.9 002/139] tipc: fix the skb_unshare() in tipc_buf_append() Date: Tue, 27 Oct 2020 14:48:16 +0100 Message-Id: <20201027134902.258213611@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027134902.130312227@linuxfoundation.org> References: <20201027134902.130312227@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Cong Wang [ Upstream commit ed42989eab57d619667d7e87dfbd8fe207db54fe ] skb_unshare() drops a reference count on the old skb unconditionally, so in the failure case, we end up freeing the skb twice here. And because the skb is allocated in fclone and cloned by caller tipc_msg_reassemble(), the consequence is actually freeing the original skb too, thus triggered the UAF by syzbot. Fix this by replacing this skb_unshare() with skb_cloned()+skb_copy(). Fixes: ff48b6222e65 ("tipc: use skb_unshare() instead in tipc_buf_append()") Reported-and-tested-by: syzbot+e96a7ba46281824cc46a@syzkaller.appspotmail.com Cc: Jon Maloy Cc: Ying Xue Signed-off-by: Cong Wang Reviewed-by: Xin Long Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/tipc/msg.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/tipc/msg.c +++ b/net/tipc/msg.c @@ -140,7 +140,8 @@ int tipc_buf_append(struct sk_buff **hea if (fragid == FIRST_FRAGMENT) { if (unlikely(head)) goto err; - frag = skb_unshare(frag, GFP_ATOMIC); + if (skb_cloned(frag)) + frag = skb_copy(frag, GFP_ATOMIC); if (unlikely(!frag)) goto err; head = *headbuf = frag;