Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp374176pxb; Wed, 3 Nov 2021 05:46:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx924xqqZpQjDdk3Et0VYInBRn/SyZ6bSjLkbXbQnIHcQ7d8YqXDVKg6r+nQVJ5E8lIdQz+ X-Received: by 2002:a17:906:9144:: with SMTP id y4mr11523709ejw.98.1635943583364; Wed, 03 Nov 2021 05:46:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635943583; cv=none; d=google.com; s=arc-20160816; b=s4MLRJGxE94rR6otKIB5c2rtz4sXmdDRQMNPA72TnBfmAUZm+lN9GxuH9ILQ/FHi+l YeKc3GXp3xL+4im3vdnZuI+26g2ByYIgbEfUS3qOIa4HaUrtFm56Yir5iEI6/HRbkE+O qN+Gzgc9zjlOjT+0SQDvJyAb6AVFojUTnb1jVao7wWnCS3MsX6XMfrn2V+c09FreYmF3 TzXvWU+R4XgumLFxX53LHt2oejlxKNpqoATvODVyM5sQ+uUx6NFTHqjTcnMbpQdU7O+v C585wwsriVOJ/VDVBfIxuphs5p6L9zAEYBT4BZuAaOvGI8u/Ub7cf86GvesAtqdXitkZ 5YfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=90K7h1vadNvDApkPIeu9bZ3f4TXBlF4ZUifSLTiW4KY=; b=u1nhutM6YtmLXf0Qp5EqLISN+gmJLIFujNfmOFYTTLbxHjb4VfUqiGfswgmkCAPLOL pJW6kpe+oIgLteEvQEVJIY7fyY85TtvgS9GCF1wA5F5vbyaxOxBGrqAm3jw6H4KeaI4G 6Y5vEiWkkLNKA9rTG/gSfQp9Jy4ZBNEHNWxPp769KATzJnpeE/cxF3TAN3NozfgHxsaE oxa5uDA2a+qxN3YCML4pwOvfPBqlAcFwpcdhLuL2vLPz8Enb4IgHuO/u2cNG/G/xmd4e ROs0JJRXGAPrN4RoHywgUMs99U4nE5anfLvw6ZT2tIH85d/q5lyJcxgqIFmtRuZuD5y/ KbmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=Y3aeSAxz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v21si2823422eji.11.2021.11.03.05.45.59; Wed, 03 Nov 2021 05:46:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=Y3aeSAxz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232054AbhKCMqg (ORCPT + 99 others); Wed, 3 Nov 2021 08:46:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231961AbhKCMqf (ORCPT ); Wed, 3 Nov 2021 08:46:35 -0400 Received: from mail-wr1-x429.google.com (mail-wr1-x429.google.com [IPv6:2a00:1450:4864:20::429]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EA446C061714; Wed, 3 Nov 2021 05:43:58 -0700 (PDT) Received: by mail-wr1-x429.google.com with SMTP id o14so3329001wra.12; Wed, 03 Nov 2021 05:43:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=90K7h1vadNvDApkPIeu9bZ3f4TXBlF4ZUifSLTiW4KY=; b=Y3aeSAxzKr+wlBlyxEumnYVVH4/dPwRP+VIztBGO1BA9KgA4qe+lXR1hiibl24iV4R 9BULyfeEGsH+b/+IBjKJjcwyXItTPKd4D4B14HprUNxI4115KjzueXWLrvRUJf8XlXOK ai/lYIxvgh/tdtyS/1Eq95kiZ6WAhvACitupAMWtw2y0JJTvxtslflq63HAiJogCq9Kc 3bQqRt2E84XYTLssYtI/+0idicVw5CxZXKCFxRfAezWWTSoKh0Us2oFzMBXhIhY2nElF EvCDwdh40+0+pZhi9xb+0ik6I/ZdAmSH8rtYTedrvPY/IteRGThC1vFw7rUsHS4QV4AE XQ4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=90K7h1vadNvDApkPIeu9bZ3f4TXBlF4ZUifSLTiW4KY=; b=nINGs4bpFXfyPT3lfFIw65UJrdWbXomVnqXAUXh9djJzbglitfP+iVs19s77d77Jpx UjbOWuqK6E475sCbL4HOOOPRBgzcC0RPP2uDwCpBoBY5dxn5INckH/GFNv/PC7iQKJER x8bs9WQ1G+vQrGEgG2m4cgMFvindEJJDeYB4EC4jZlwAE2PneEpzR909+BJ2RcQqtH7y 66q+c34G+LjnhquCtlXzmTFE8lFrYdlYSF9VOApoLpYMZio4kh7pOvOyXA3LW7wCQl1/ jTcM6dRqOdWeM7w/AWctQecJ4G6KFi0hHBRkvx2F8GJOsnwr//m+srYwzC4ogHUoOk+h j/pw== X-Gm-Message-State: AOAM531hAK1J58QaNiyubD+j2z8dod3bnfzTXL7AVOtdxrL3Ij86J2rM 754Wi+BOQaGC1WYKkgQgKr79FcP6gfZ+BNABLpE= X-Received: by 2002:a5d:47aa:: with SMTP id 10mr24412405wrb.50.1635943437431; Wed, 03 Nov 2021 05:43:57 -0700 (PDT) MIME-Version: 1.0 References: <1635884824-28790-1-git-send-email-khoroshilov@ispras.ru> In-Reply-To: <1635884824-28790-1-git-send-email-khoroshilov@ispras.ru> From: Xin Long Date: Wed, 3 Nov 2021 08:43:45 -0400 Message-ID: Subject: Re: [PATCH] sctp: avoid NULL pointer dereference in sctp_sf_violation To: Alexey Khoroshilov Cc: Vlad Yasevich , Neil Horman , Marcelo Ricardo Leitner , "David S. Miller" , Jakub Kicinski , "linux-sctp @ vger . kernel . org" , network dev , LKML , ldv-project@linuxtesting.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 2, 2021 at 4:27 PM Alexey Khoroshilov wrote: > > Some callers (e.g. sctp_sf_violation_chunk) passes NULL to > asoc argument of sctp_sf_violation. So, it should check it > before calling sctp_vtag_verify(). > > Probably it could be exploited by a malicious SCTP packet > to cause NULL pointer dereference. I don't think asoc can be NULL in here, did you see any call trace caused by it? If this was found by a tool, please remove the unnecessary call from sctp_sf_violation_chunk() instead: @@ -4893,9 +4893,6 @@ static enum sctp_disposition sctp_sf_violation_chunk( { static const char err_str[] = "The following chunk violates protocol:"; - if (!asoc) - return sctp_sf_violation(net, ep, asoc, type, arg, commands); - Thanks. > > Found by Linux Verification Center (linuxtesting.org) with SVACE. > > Signed-off-by: Alexey Khoroshilov > Fixes: aa0f697e4528 ("sctp: add vtag check in sctp_sf_violation") > --- > net/sctp/sm_statefuns.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/net/sctp/sm_statefuns.c b/net/sctp/sm_statefuns.c > index fb3da4d8f4a3..77f3cd6c516e 100644 > --- a/net/sctp/sm_statefuns.c > +++ b/net/sctp/sm_statefuns.c > @@ -4669,7 +4669,7 @@ enum sctp_disposition sctp_sf_violation(struct net *net, > { > struct sctp_chunk *chunk = arg; > > - if (!sctp_vtag_verify(chunk, asoc)) > + if (asoc && !sctp_vtag_verify(chunk, asoc)) > return sctp_sf_pdiscard(net, ep, asoc, type, arg, commands); > > /* Make sure that the chunk has a valid length. */ > -- > 2.7.4 >