Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3526917pxf; Mon, 15 Mar 2021 11:31:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzWuk2wGpRTA7amQ4ieLDNfVIYzxfvSPffdccmvMlTympprsB0pHn7YGw9Dl8ESd/mk7ZOc X-Received: by 2002:a05:6402:1393:: with SMTP id b19mr31497944edv.333.1615833117873; Mon, 15 Mar 2021 11:31:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615833117; cv=none; d=google.com; s=arc-20160816; b=vd6CKiMELiSf1h8VS3i9eWuwNeLJtYTl+ewoZz5WPdMpWieM4HIfrr8pkx33dQn0kS na+Am7hjQzGg81nmmKerb+8F5cGM7fxkST4imZT3oXRxQKLmaRx6Yeia6eVLTPCPAC4u egmorZJSDZ48fO1WKrITXS7LrT5ij7VNKAZS4KVExZbafVPpmlyYUcPBYSceK+S0+7TZ HjoJ43LP5kUFlfSoOXbHvr8DBzXqkUNFXZz0TNIVOzdYWQYg6TwupX4HR1/QzTtx7vU+ 0aqflxvn9OhCoovF6ErmcNcc7mMcwbbaLeFl2Mm4+SJvedFfJZaEHPgfBlABVLTtsjz3 w6dA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=90x5dKs94Mf89b4ZaAlxYdEJZ07YUWUhXQw9mIJl9DY=; b=IiPyhLsFqDqAVAIckeShCoV8EjNdENXBiQXsy56ypRoJeIbGUFV069IKJ2LtMb97oS 1pkY0DiG+vng/YravjBN+BoASvgHn9+csFDdL9NiAqdBzT8ZCR2C4itlOrRGjXt/4MYb +u3L+SrB1F9Q4ZWkCVeMKLIA+D4RNOs7+h1G08QkGYDc3rfK+dz+WoEdnTXNvfD06+iO StSVza6yhZ6no5gubEaPxwNUPyzKhc/vuC94105LCYQezrUYF9/KbcNocPk85dYm/QJ9 NspJ7jU4UvTMlYEwdJNHSsd43diG/up+jxNmHu2oUfAaUo+TZiyZF/P8SaUnBQtrhjPS 2jRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=bQKZzfA1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y3si6272241eda.196.2021.03.15.11.31.35; Mon, 15 Mar 2021 11:31:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=bQKZzfA1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232055AbhCOOkJ (ORCPT + 99 others); Mon, 15 Mar 2021 10:40:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:49074 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233792AbhCOOC1 (ORCPT ); Mon, 15 Mar 2021 10:02:27 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1503864EEE; Mon, 15 Mar 2021 14:02:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1615816947; bh=RN75x/A94mjN2UFU9gW7nIGSelmOyH6pWJnZ512dQT4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bQKZzfA15wpbevjt0yleIgfKeaKb1RUy0cPtvhuYAIM0+rZW7hvH1wSNs1tgjmp2w Ht8aY3DpXYyFm/AX7Dwr9Dsp6cfRVzG3tyTLkrO5f8CwiRe5DEU533YylVwWfDfutC gbWUFFpzB/Q/LxdHMV7oFuh6Tk9mTlUTnavs1/fs= From: gregkh@linuxfoundation.org To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Srinivas Kandagatla , Jonathan Marek , Dmitry Baryshkov Subject: [PATCH 5.11 220/306] misc: fastrpc: restrict user apps from sending kernel RPC messages Date: Mon, 15 Mar 2021 14:54:43 +0100 Message-Id: <20210315135515.054318944@linuxfoundation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210315135507.611436477@linuxfoundation.org> References: <20210315135507.611436477@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman From: Dmitry Baryshkov commit 20c40794eb85ea29852d7bc37c55713802a543d6 upstream. Verify that user applications are not using the kernel RPC message handle to restrict them from directly attaching to guest OS on the remote subsystem. This is a port of CVE-2019-2308 fix. Fixes: c68cfb718c8f ("misc: fastrpc: Add support for context Invoke method") Cc: Srinivas Kandagatla Cc: Jonathan Marek Cc: stable@vger.kernel.org Signed-off-by: Dmitry Baryshkov Link: https://lore.kernel.org/r/20210212192658.3476137-1-dmitry.baryshkov@linaro.org Signed-off-by: Greg Kroah-Hartman --- drivers/misc/fastrpc.c | 5 +++++ 1 file changed, 5 insertions(+) --- a/drivers/misc/fastrpc.c +++ b/drivers/misc/fastrpc.c @@ -950,6 +950,11 @@ static int fastrpc_internal_invoke(struc if (!fl->cctx->rpdev) return -EPIPE; + if (handle == FASTRPC_INIT_HANDLE && !kernel) { + dev_warn_ratelimited(fl->sctx->dev, "user app trying to send a kernel RPC message (%d)\n", handle); + return -EPERM; + } + ctx = fastrpc_context_alloc(fl, kernel, sc, args); if (IS_ERR(ctx)) return PTR_ERR(ctx);