Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp7606973rdb; Thu, 4 Jan 2024 01:41:21 -0800 (PST) X-Google-Smtp-Source: AGHT+IH4I6DnGGeLywB9pS2OBB7fJ9j+SkdMbaRB3yIIzhpIleeJB76RAYp5AAS9T/w/eH4jiN7U X-Received: by 2002:a37:c407:0:b0:781:26c3:7c40 with SMTP id d7-20020a37c407000000b0078126c37c40mr247007qki.53.1704361281322; Thu, 04 Jan 2024 01:41:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704361281; cv=none; d=google.com; s=arc-20160816; b=AgHWPJi6ofnA3LVW4vOW797wRRyKi5YWxRr9nZFp7SzRwU0+yzSjLbJvszdoss09ry lo8k2dWPrDHI0KQgciZYeVq4otJhHGcDxTZSz5UVjrPMF96IQaLYSwZnS1zPpHmVAJqd 0K0Z8Rn5qNOb0IYYk8puft8bDXpmeJO17gRgiZVyKTKWis6RqIKzVi3BnhJjtEbeLcI1 Zbg0bRkFuqRB/5e6jSASmF++tDp1gMPky6JkBIMinUmO8Ul8NLl7DyhbwogBnOT6SHKV GVDoXkWcgdUz92pvu0qiymGD5svXVl9T/r6rrugoBNTBpoYKl/zN1Jt4bHHEO/T8Ryu+ 9rgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:organization:autocrypt:from :references:cc:to:content-language:subject:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature; bh=QqAQvXUABPE2esOHug0dITG/dfqhrSD3nWANAc4HZSs=; fh=NkWorfIal991XPlKZbCqBe/TPM+joYJuOaCZz6bgTd0=; b=0Zc+3lFDFk34f0WQu1yNJtiAJvUJNHEECCWf4BUgfeb8geIXMzk16muHqOCEq2vKNS z2Dr1CySOxq1peZh7MCpGEOgoNSbtZtj1SbAn1Ck53x/dhSgjsXaE4LPsZbOuORQonTp 3J23jDIJOgBRhz+rblo8lMoJFJ+R5V02NqMDgoQRuiHc5UnYL/Z29MGqDnHQzXUMzEjb QcKwMuTO+2SiIiDXi4MOCdOXqx4vu0Noca2cArFBb76HvN6npgcPEN/Y2EIcAnXwSLBK 5AmMELbzwGUQfXtlH0SWs18UxHOD8AUiy89PKOG5ZhOkFy/rPHWzHxV9Ig5m2OeNVLT2 nAdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=PciEGIzn; spf=pass (google.com: domain of linux-kernel+bounces-16457-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-16457-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id j8-20020a05620a410800b0077d72ae1615si32555263qko.265.2024.01.04.01.41.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Jan 2024 01:41:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-16457-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=PciEGIzn; spf=pass (google.com: domain of linux-kernel+bounces-16457-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-16457-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B8B301C2132F for ; Thu, 4 Jan 2024 09:41:20 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C0770208C9; Thu, 4 Jan 2024 09:41:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=canonical.com header.i=@canonical.com header.b="PciEGIzn" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp-relay-canonical-0.canonical.com (smtp-relay-canonical-0.canonical.com [185.125.188.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A1A8320B00; Thu, 4 Jan 2024 09:41:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canonical.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=canonical.com Received: from [192.168.192.85] (unknown [50.39.103.33]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-0.canonical.com (Postfix) with ESMTPSA id 960893F282; Thu, 4 Jan 2024 09:41:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1704361266; bh=QqAQvXUABPE2esOHug0dITG/dfqhrSD3nWANAc4HZSs=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=PciEGIzncwLwkPF0GJsbIc16+HSzi9xiqSCeOBqauYLpYuMsQig7aa3JdcuE1jefB zTCRe6CCfDqu/OQMXOxjKnkZZ+wAW8NEJLEFZANCyJi8z/A0h8OFcW7NctX+X8fPV7 n7oWTYAnr/eltrXmY69geeQG+Y4uv48dh8HdZmR1mOuT48amM8TqJdaa9AbzDNSiMs 4Zv0U3ALsen9PsgpmiXt9iXVWCtaC8i83HE/e4AAsL/09T1IV7Qsl3REsyySYsBIia DARvd8+WJj4ffIIvtXIMzZZ5gnOpH3jy0cDcUTsFSpcBA+9nyQzgnCv1b55zXy+H7B 7r4T4shR9ncmQ== Message-ID: Date: Thu, 4 Jan 2024 01:41:04 -0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] apparmor: fix possible memory leak in unpack_trans_table Content-Language: en-US To: Fedor Pchelkin Cc: Paul Moore , James Morris , "Serge E. Hallyn" , apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Alexey Khoroshilov , lvc-project@linuxtesting.org References: <20231204181945.5903-1-pchelkin@ispras.ru> From: John Johansen Autocrypt: addr=john.johansen@canonical.com; keydata= xsFNBE5mrPoBEADAk19PsgVgBKkImmR2isPQ6o7KJhTTKjJdwVbkWSnNn+o6Up5knKP1f49E BQlceWg1yp/NwbR8ad+eSEO/uma/K+PqWvBptKC9SWD97FG4uB4/caomLEU97sLQMtnvGWdx rxVRGM4anzWYMgzz5TZmIiVTZ43Ou5VpaS1Vz1ZSxP3h/xKNZr/TcW5WQai8u3PWVnbkjhSZ PHv1BghN69qxEPomrJBm1gmtx3ZiVmFXluwTmTgJOkpFol7nbJ0ilnYHrA7SX3CtR1upeUpM a/WIanVO96WdTjHHIa43fbhmQube4txS3FcQLOJVqQsx6lE9B7qAppm9hQ10qPWwdfPy/+0W 6AWtNu5ASiGVCInWzl2HBqYd/Zll93zUq+NIoCn8sDAM9iH+wtaGDcJywIGIn+edKNtK72AM gChTg/j1ZoWH6ZeWPjuUfubVzZto1FMoGJ/SF4MmdQG1iQNtf4sFZbEgXuy9cGi2bomF0zvy BJSANpxlKNBDYKzN6Kz09HUAkjlFMNgomL/cjqgABtAx59L+dVIZfaF281pIcUZzwvh5+JoG eOW5uBSMbE7L38nszooykIJ5XrAchkJxNfz7k+FnQeKEkNzEd2LWc3QF4BQZYRT6PHHga3Rg ykW5+1wTMqJILdmtaPbXrF3FvnV0LRPcv4xKx7B3fGm7ygdoowARAQABzStKb2huIEpvaGFu c2VuIDxqb2huLmpvaGFuc2VuQGNhbm9uaWNhbC5jb20+wsF3BBMBCgAhBQJOjRdaAhsDBQsJ CAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEAUvNnAY1cPYi0wP/2PJtzzt0zi4AeTrI0w3Rj8E Waa1NZWw4GGo6ehviLfwGsM7YLWFAI8JB7gsuzX/im16i9C3wHYXKs9WPCDuNlMc0rvivqUI JXHHfK7UHtT0+jhVORyyVVvX+qZa7HxdZw3jK+ROqUv4bGnImf31ll99clzo6HpOY59soa8y 66/lqtIgDckcUt/1ou9m0DWKwlSvulL1qmD25NQZSnvB9XRZPpPd4bea1RTa6nklXjznQvTm MdLq5aJ79j7J8k5uLKvE3/pmpbkaieEsGr+azNxXm8FPcENV7dG8Xpd0z06E+fX5jzXHnj69 DXXc3yIvAXsYZrXhnIhUA1kPQjQeNG9raT9GohFPMrK48fmmSVwodU8QUyY7MxP4U6jE2O9L 7v7AbYowNgSYc+vU8kFlJl4fMrX219qU8ymkXGL6zJgtqA3SYHskdDBjtytS44OHJyrrRhXP W1oTKC7di/bb8jUQIYe8ocbrBz3SjjcL96UcQJecSHu0qmUNykgL44KYzEoeFHjr5dxm+DDg OBvtxrzd5BHcIbz0u9ClbYssoQQEOPuFmGQtuSQ9FmbfDwljjhrDxW2DFZ2dIQwIvEsg42Hq 5nv/8NhW1whowliR5tpm0Z0KnQiBRlvbj9V29kJhs7rYeT/dWjWdfAdQSzfoP+/VtPRFkWLr 0uCwJw5zHiBgzsFNBE5mrPoBEACirDqSQGFbIzV++BqYBWN5nqcoR+dFZuQL3gvUSwku6ndZ vZfQAE04dKRtIPikC4La0oX8QYG3kI/tB1UpEZxDMB3pvZzUh3L1EvDrDiCL6ef93U+bWSRi GRKLnNZoiDSblFBST4SXzOR/m1wT/U3Rnk4rYmGPAW7ltfRrSXhwUZZVARyJUwMpG3EyMS2T dLEVqWbpl1DamnbzbZyWerjNn2Za7V3bBrGLP5vkhrjB4NhrufjVRFwERRskCCeJwmQm0JPD IjEhbYqdXI6uO+RDMgG9o/QV0/a+9mg8x2UIjM6UiQ8uDETQha55Nd4EmE2zTWlvxsuqZMgy W7gu8EQsD+96JqOPmzzLnjYf9oex8F/gxBSEfE78FlXuHTopJR8hpjs6ACAq4Y0HdSJohRLn 5r2CcQ5AsPEpHL9rtDW/1L42/H7uPyIfeORAmHFPpkGFkZHHSCQfdP4XSc0Obk1olSxqzCAm uoVmRQZ3YyubWqcrBeIC3xIhwQ12rfdHQoopELzReDCPwmffS9ctIb407UYfRQxwDEzDL+m+ TotTkkaNlHvcnlQtWEfgwtsOCAPeY9qIbz5+i1OslQ+qqGD2HJQQ+lgbuyq3vhefv34IRlyM sfPKXq8AUTZbSTGUu1C1RlQc7fpp8W/yoak7dmo++MFS5q1cXq29RALB/cfpcwARAQABwsFf BBgBCgAJBQJOZqz6AhsMAAoJEAUvNnAY1cPYP9cP/R10z/hqLVv5OXWPOcpqNfeQb4x4Rh4j h/jS9yjes4uudEYU5xvLJ9UXr0wp6mJ7g7CgjWNxNTQAN5ydtacM0emvRJzPEEyujduesuGy a+O6dNgi+ywFm0HhpUmO4sgs9SWeEWprt9tWrRlCNuJX+u3aMEQ12b2lslnoaOelghwBs8IJ r998vj9JBFJgdeiEaKJLjLmMFOYrmW197As7DTZ+R7Ef4gkWusYFcNKDqfZKDGef740Xfh9d yb2mJrDeYqwgKb7SF02Hhp8ZnohZXw8ba16ihUOnh1iKH77Ff9dLzMEJzU73DifOU/aArOWp JZuGJamJ9EkEVrha0B4lN1dh3fuP8EjhFZaGfLDtoA80aPffK0Yc1R/pGjb+O2Pi0XXL9AVe qMkb/AaOl21F9u1SOosciy98800mr/3nynvid0AKJ2VZIfOP46nboqlsWebA07SmyJSyeG8c XA87+8BuXdGxHn7RGj6G+zZwSZC6/2v9sOUJ+nOna3dwr6uHFSqKw7HwNl/PUGeRqgJEVu++ +T7sv9+iY+e0Y+SolyJgTxMYeRnDWE6S77g6gzYYHmcQOWP7ZMX+MtD4SKlf0+Q8li/F9GUL p0rw8op9f0p1+YAhyAd+dXWNKf7zIfZ2ME+0qKpbQnr1oizLHuJX/Telo8KMmHter28DPJ03 lT9Q Organization: Canonical In-Reply-To: <20231204181945.5903-1-pchelkin@ispras.ru> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 12/4/23 10:19, Fedor Pchelkin wrote: > If we fail to unpack the transition table then the table elements which > have been already allocated are not freed on error path. > > unreferenced object 0xffff88802539e000 (size 128): > comm "apparmor_parser", pid 903, jiffies 4294914938 (age 35.085s) > hex dump (first 32 bytes): > 20 73 6f 6d 65 20 6e 61 73 74 79 20 73 74 72 69 some nasty stri > 6e 67 20 73 6f 6d 65 20 6e 61 73 74 79 20 73 74 ng some nasty st > backtrace: > [] __kmem_cache_alloc_node+0x1e2/0x2d0 > [] __kmalloc_node_track_caller+0x54/0x170 > [] kmemdup+0x29/0x60 > [] aa_unpack_strdup+0xe5/0x1b0 > [] unpack_pdb+0xeb8/0x2700 > [] unpack_profile+0x1507/0x4a30 > [] aa_unpack+0x36a/0x1560 > [] aa_replace_profiles+0x213/0x33c0 > [] policy_update+0x261/0x370 > [] profile_replace+0x20e/0x2a0 > [] vfs_write+0x2af/0xe00 > [] ksys_write+0x126/0x250 > [] do_syscall_64+0x46/0xf0 > [] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > > Call aa_free_str_table() on error path as was done before the blamed > commit. It implements all necessary checks, frees str_table if it is > available and nullifies the pointers. > > Found by Linux Verification Center (linuxtesting.org). > > Fixes: a0792e2ceddc ("apparmor: make transition table unpack generic so it can be reused") > Signed-off-by: Fedor Pchelkin thanks, I have pulled this into my tree Acked-by: John Johansen > --- > security/apparmor/lib.c | 1 + > security/apparmor/policy_unpack.c | 7 +++---- > 2 files changed, 4 insertions(+), 4 deletions(-) > > diff --git a/security/apparmor/lib.c b/security/apparmor/lib.c > index 4c198d273f09..cd569fbbfe36 100644 > --- a/security/apparmor/lib.c > +++ b/security/apparmor/lib.c > @@ -41,6 +41,7 @@ void aa_free_str_table(struct aa_str_table *t) > kfree_sensitive(t->table[i]); > kfree_sensitive(t->table); > t->table = NULL; > + t->size = 0; > } > } > > diff --git a/security/apparmor/policy_unpack.c b/security/apparmor/policy_unpack.c > index fc21952aca6b..887010692538 100644 > --- a/security/apparmor/policy_unpack.c > +++ b/security/apparmor/policy_unpack.c > @@ -478,6 +478,8 @@ static bool unpack_trans_table(struct aa_ext *e, struct aa_str_table *strs) > if (!table) > goto fail; > > + strs->table = table; > + strs->size = size; > for (i = 0; i < size; i++) { > char *str; > int c, j, pos, size2 = aa_unpack_strdup(e, &str, NULL); > @@ -520,14 +522,11 @@ static bool unpack_trans_table(struct aa_ext *e, struct aa_str_table *strs) > goto fail; > if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) > goto fail; > - > - strs->table = table; > - strs->size = size; > } > return true; > > fail: > - kfree_sensitive(table); > + aa_free_str_table(strs); > e->pos = saved_pos; > return false; > }