Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp1163223lqb; Sat, 25 May 2024 08:19:23 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXKcGwKvHjgF5RJQ2+2gZj44m11jfmAbnpt5BgoxNlu8jhFE7rjNDsa/HHYxSKGobOM1GB4Za0kVTGNjy1I8ukfEQ8RyK2hcEcwBSdApw== X-Google-Smtp-Source: AGHT+IEuy7iQqT6GiRG0576B0eNvcVkrdf1Eifnld4ATWp7UeeFKv+z+25MQXYQwLl926GGkOi25 X-Received: by 2002:a05:6a00:1d8f:b0:6f6:7a47:3686 with SMTP id d2e1a72fcca58-6f8f35dac57mr5993085b3a.9.1716650363653; Sat, 25 May 2024 08:19:23 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716650363; cv=pass; d=google.com; s=arc-20160816; b=oeDbk9/70vk4LHO6kgc8uvKTgm7f6qLgNXQ9rQJ17tAhLPROx29rQArKTaLPRNcYel keoGYYVuWNF9KgFpiqEsZoDcvd7kvk5MtPtYJTt5qRC6FbGPjFZgX6Rajt60PlsKkQgZ zDIKu+5xOsILcMqf2RbOeRj26RxoR8KexzbMViixa12NN41/x7rPZZDpw4dED/fMnlF8 101uscPIWrD+SBzuf1T2mmd08JoE2Y45LjZDpbzoCqcea2u/rCmybVu7gpxXybxyesy9 Wo7mMvTT6nN8z9zsaE2AY7TsdfOQwrhWl8cEKDt8fSRXfbuTfgRx64IAJIklk4e8jytf h5Mw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=cwHS+v1bEyF5rqXfZuvZevp8oFEnLViUuQgiliIiYms=; fh=FwaExGzd5+7SFyU3FvFkOW0m2MEiNLF1W2fS4wlemFU=; b=HjSOs7R/4uI6CuPajqA8z4Oxmwm5Mu37XxTm6rRjAlps9frTQn2xhIEL+j+3kBICbf g68FytdC8s0zcx7cDU+L9X81MPA6dOxhW9WAMLYEO4qnEhMDHQ45Bk8YHs3ta35jxDLE pJXNECUC7t1Pusi8qfizPfgFE07wWsBrBuUnU68opyZ6LnVqaf3wy7MiLny+3V306PKt lr7yUz1zwSb3LQlzaZrFeSBc8hDqManmEsPvoXnIdgaooqQV+3Di59IxGaTPR+/WAUAP G/U3/Y0b4NLSADB3cAqf1LgUGKLAdeynKY9MVOrptUbeyPGp6LDugm/uQAaZGijOqN9U vHJg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=i5jDRN6U; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-189418-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-189418-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id d2e1a72fcca58-6f8fc36d1d8si3179622b3a.110.2024.05.25.08.19.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 25 May 2024 08:19:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-189418-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=i5jDRN6U; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-189418-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-189418-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 46E6C2815C9 for ; Sat, 25 May 2024 15:19:23 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4A07D83A19; Sat, 25 May 2024 15:19:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="i5jDRN6U" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 71E2A629E4; Sat, 25 May 2024 15:19:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716650357; cv=none; b=XuXdIykTD2H1WYIS9ipls5e+ibBcJCVTdryXDmgGhg+JoDXlH9htWH0CbA3xH7cOTYsnqaywGU36U7RT3u9oSoZwfz3N8J8ABETn6fznhCkNt/4vyzq4CQpyCiNivBGyfWZeVhRuwsByOE3E5iFfHCqtpDswINk90Eduk0Kjvnc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716650357; c=relaxed/simple; bh=91BTlkXObS3yoC0oiD0AIkqH/c4Yd0+41EvKfe2t4Wc=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=QN17rovo+Ey+mDORuu+GzV+JJzhHk3cZSo8g4v0o/pKcsPMZx/dwD9v54pb6NWTMPWSnwqOaekn575dLB7TnUuf5faMCjuBJAxYPstRXt9RLHojSqAP2LofbwXqclyR03RNADvZ5b92fmxkNRA/Fnw9D8rfZ5PGB4gtclmGlkns= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=i5jDRN6U; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id BB4ACC32782; Sat, 25 May 2024 15:19:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1716650357; bh=91BTlkXObS3yoC0oiD0AIkqH/c4Yd0+41EvKfe2t4Wc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=i5jDRN6UzvX2b8c03r3jMRpDtHNJjTE/Xol72PmBK7uCQ4ja9JR6lm6j8Iayo6/L4 FktXgljv7DdTqsSjuBZZxtNzxxm+POJ7IkQmKPgUm43eb/n3AmTluh1SqdpkOQfmgo F8rSut3qt2Ced+yfE3wG12QRSU4c8VRTluCAh6dw= Date: Sat, 25 May 2024 17:19:14 +0200 From: Greg Kroah-Hartman To: "Eduardo' Vela\" " Cc: Jens Axboe , Gabriel Krisman Bertazi , linux-cve-announce@vger.kernel.org, cve@kernel.org, linux-kernel@vger.kernel.org, =?iso-8859-1?Q?Tam=E1s?= Koczka Subject: Re: CVE-2023-52656: io_uring: drop any code related to SCM_RIGHTS Message-ID: <2024052521-recharger-islamic-5f6f@gregkh> References: <2024051338-CVE-2023-52656-6545@gregkh> <871q5rqhuc.fsf@mailhost.krisman.be> <2024052542-diner-snare-a618@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: On Sat, May 25, 2024 at 05:09:45PM +0200, Eduardo' Vela" wrote: > On Sat, 25 May 2024, 09:15 Greg Kroah-Hartman, > wrote: > > > On Fri, May 24, 2024 at 10:57:07AM -0600, Jens Axboe wrote: > > > On 5/24/24 10:45 AM, Gabriel Krisman Bertazi wrote: > > > > Greg Kroah-Hartman writes: > > > > > > > >> Description > > > >> =========== > > > >> > > > >> In the Linux kernel, the following vulnerability has been resolved: > > > >> > > > >> io_uring: drop any code related to SCM_RIGHTS > > > >> > > > >> This is dead code after we dropped support for passing io_uring fds > > > >> over SCM_RIGHTS, get rid of it. > > > >> > > > >> The Linux kernel CVE team has assigned CVE-2023-52656 to this issue. > > > > > > > > Hello Greg, > > > > > > > > [+Jens in Cc] > > > > > > > > This is stable material, but doesn't deserve CVE status. There is > > > > nothing exploitable that is fixed here. Instead, this commit is > > dropping > > > > unreachable code after the removal of a feature, following another CVE > > > > report. Doing the clean up in the original patch would have made the > > > > real security fix harder to review. > > > > > > > > The real issue was reported as CVE-2023-52654 and handled by a > > different > > > > commit. > > > > > > FWIW, the same is true for a number of other commits recently. They are > > > nowhere near CVE material, it's just generic bug fixes. > > > > Ok, glad to revoke them if you do not think they are user triggerable > > issues. I'll go reject this one right now, thanks. > > > > Good day! > > So, either I'm completely lost or CVE-2023-52656 shouldn't have been > rejected. Forgive me for mudding the problem even more. > > I think we need to unreject this CVE (CVE-2023-52656) or CVE-2023-52654 > should be amended to include the dead code removal commit.. that said, > that'll be weirder than just unrejecting this commit. > > The reason is that the commit "io_uring/af_unix: disable sending io_uring > over sockets" is not enough to fix the vulnerability in stable branches, > because e.g. bcedd497b3b4a0be56f3adf7c7542720eced0792 on 5.15 only fixes > one path (io_sqe_file_register) to reach unix_inflight(), but it is still > reachable via another path (io_sqe_fileS_register) which is only removed by > d909d381c3152393421403be4b6435f17a2378b4 ("io_uring: drop any code related > to SCM_RIGHTS"). > > Although that patch claims "it is dead code", this claim was only true on > upstream, but not on stable branches (or at least on 5.15 where the > vulnerability was proven to be reachable). > > What a mess! ???? > > My colleague poprdi@google.com sent this analysis to the CNA list, so maybe > we can continue the discussion there as he also provided some additional > details there. Oh yeah, that's right, that's why we issued that! Jens, any objection for me restoring this CVE? thanks, greg k-h