Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp1170263lqb; Sat, 25 May 2024 08:37:28 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW3FCWHeOXVEySu4WgsnVHyCbgj1aYvQs1HWETP/g/mOIYRCGoUO/pjOwsk2s1WbniZ5w02yx3/zpZW8e1cJQHXPpKsZ+tJfConLx5buQ== X-Google-Smtp-Source: AGHT+IFpPukp4LqwBcUPt1CrvYrDwHc3utT3a2JW7/NQ1KWjjoZ+BnXwahLYeoOU13wFIydT1d1Y X-Received: by 2002:a05:6512:3d15:b0:51d:2af8:2e7b with SMTP id 2adb3069b0e04-529679318demr5195477e87.57.1716651448251; Sat, 25 May 2024 08:37:28 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716651448; cv=pass; d=google.com; s=arc-20160816; b=Jsk+3gO4/n2qOT0Z9n5KF419ESoYGi2N1oSHJUggUfuQkHcIHZsZMx6iYqlnGcmTJX fQWYVdsswP4MrnyGIfdUzwLyKq/bVeis2dwsOXWyXzt1JoSJ/lKRrpC7yo3YAyn2uiNS qIzLAtlO/v1cMTdc6dqffQ9W/AnhtssFNEG9F4f/Z0i9OZFDpmK9VXxM5eI0AIjj3yCY hxREFcnEtK7uvFIYBct/IVULaxCWB1RUYTxG7QD/YwfDvFu1rse124OieJGpBdWyOOLg VhVJK5s/pw+NhQ90p0dWpBpORFuN/YgBpL6iiMaI/LrqE3BHzionDdFCbTN+qXt0aGK2 CZaA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=n/U8hD8H+kLXPXlBW7X9R17U+ogoKDOxicEdjQYLTmA=; fh=C1a4UBG40GbqMOLs4s9ebzjwqaKzcCSK4mxu7nS7aOI=; b=crxWf92IHoI0mvY4ZvXrnbwN+U/OhhOqNeor3njSqal5sAiZIQzg/7W0DtcYccmL2B 3SVkA9sxqZDHuUUxO/17JwKpNPj107HHXqCRN9KYWNrnkU5fh4tqlTen7dcjg4RMmNYF bPFu+OJ4yd6uJruaVFLtxLrLqwQtM2MYon0zfcxflpmwyoceO6MVct1k/FuNPtDRzEqZ nCEcIu9sPSI11E6rCECV7pAVrvf2VTaF2szmf0XfBrPGUPIXf86Vbj38QoXfQwFmF57D D1yHye4boiHza/USsTMgQmN5Tvq1HnAbRmxAAK3TOJORpefpi09VJz7BdMUC4PVSvWRl byzA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0qyl2cPB; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-189425-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-189425-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id a640c23a62f3a-a626cd95baesi194747166b.834.2024.05.25.08.37.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 25 May 2024 08:37:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-189425-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0qyl2cPB; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-189425-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-189425-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id ED7611F213B6 for ; Sat, 25 May 2024 15:37:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id BA74783CBB; Sat, 25 May 2024 15:37:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="0qyl2cPB" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E424A1DFFC; Sat, 25 May 2024 15:37:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716651441; cv=none; b=CrPCrkXeZ1/BcZ0/79gDQWlP0yDlPoWiaGyIKUztBPF9qy/zdJEcE1kQ31/FEGC9CaiRb1Jz6CSwfi2+hjqVRIVfDzj0xNkQkOL7LbhkCnF4FNqGyuWGtOYcBjQz5JpFx7lR8BP2ZG9hURPdWx++QAuYxb3CVupWpFy40tpDS8U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716651441; c=relaxed/simple; bh=uUjeSZ8n67tGvTCtDHKyxBGEkV9qifQrCGxlPSJk66o=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=m+z64L7OVLQAv6yEJGY/ndMmSS/5j7Jg1hAQ+7ZVoVDAuJasCg4YOYv7qbe4H7dfOz3HWVz6caIHZvknbvhCVKXAKgGEBXYfZ/lGwmQq6HRGEHkEwKxnhg4LUsVomSfNYdeCF6e0OP+6QHLgbVM/H3mzHuy5wwfywjHlaNsT8xo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=0qyl2cPB; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 04832C2BD11; Sat, 25 May 2024 15:37:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1716651440; bh=uUjeSZ8n67tGvTCtDHKyxBGEkV9qifQrCGxlPSJk66o=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=0qyl2cPBnHKuucOVAjyKvESVrXQGsXxfKWpuN/BA28C774waGj//eRVoKn5AjWNdv 81ebPTjxtVd1eMjbo+6AHFuFYEgOg9vJ/tmsgxnVWx80ORphnw9fkjQ9mSftc/EpyM zoM9ECcOjCTlbeg4glMTQWk3K6kYXrCmZW1GfWgQ= Date: Sat, 25 May 2024 17:37:22 +0200 From: Greg Kroah-Hartman To: Jens Axboe Cc: Gabriel Krisman Bertazi , linux-cve-announce@vger.kernel.org, cve@kernel.org, linux-kernel@vger.kernel.org, =?iso-8859-1?Q?Tam=E1s?= Koczka Subject: Re: CVE-2023-52656: io_uring: drop any code related to SCM_RIGHTS Message-ID: <2024052515-usual-chewer-cbb4@gregkh> References: <2024051338-CVE-2023-52656-6545@gregkh> <871q5rqhuc.fsf@mailhost.krisman.be> <2024052542-diner-snare-a618@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Sat, May 25, 2024 at 09:28:35AM -0600, Jens Axboe wrote: > On 5/25/24 9:09 AM, Eduardo' Vela" wrote: > > On Sat, 25 May 2024, 09:15 Greg Kroah-Hartman, > wrote: > > > > On Fri, May 24, 2024 at 10:57:07AM -0600, Jens Axboe wrote: > > > On 5/24/24 10:45 AM, Gabriel Krisman Bertazi wrote: > > > > Greg Kroah-Hartman > writes: > > > > > > > >> Description > > > >> =========== > > > >> > > > >> In the Linux kernel, the following vulnerability has been resolved: > > > >> > > > >> io_uring: drop any code related to SCM_RIGHTS > > > >> > > > >> This is dead code after we dropped support for passing io_uring fds > > > >> over SCM_RIGHTS, get rid of it. > > > >> > > > >> The Linux kernel CVE team has assigned CVE-2023-52656 to this issue. > > > > > > > > Hello Greg, > > > > > > > > [+Jens in Cc] > > > > > > > > This is stable material, but doesn't deserve CVE status. There is > > > > nothing exploitable that is fixed here. Instead, this commit is dropping > > > > unreachable code after the removal of a feature, following another CVE > > > > report. Doing the clean up in the original patch would have made the > > > > real security fix harder to review. > > > > > > > > The real issue was reported as CVE-2023-52654 and handled by a different > > > > commit. > > > > > > FWIW, the same is true for a number of other commits recently. They are > > > nowhere near CVE material, it's just generic bug fixes. > > > > Ok, glad to revoke them if you do not think they are user triggerable > > issues. I'll go reject this one right now, thanks. > > > > > > Good day! > > > > So, either I'm completely lost or CVE-2023-52656 shouldn't have been > > rejected. Forgive me for mudding the problem even more. > > > > I think we need to unreject this CVE (CVE-2023-52656) or > > CVE-2023-52654 should be amended to include the dead code removal > > commit.. that said, that'll be weirder than just unrejecting this > > commit. > > > > The reason is that the commit "io_uring/af_unix: disable sending > > io_uring over sockets" is not enough to fix the vulnerability in > > stable branches, because e.g. bcedd497b3b4a0be56f3adf7c7542720eced0792 > > on 5.15 only fixes one path (io_sqe_file_register) to reach > > unix_inflight(), but it is still reachable via another path > > (io_sqe_fileS_register) which is only removed by > > d909d381c3152393421403be4b6435f17a2378b4 ("io_uring: drop any code > > related to SCM_RIGHTS"). > > > > Although that patch claims "it is dead code", this claim was only true > > on upstream, but not on stable branches (or at least on 5.15 where the > > vulnerability was proven to be reachable). > > > > What a mess! ? > > Ah right, yeah it was a mess because of the stable backports, it was not > for the upstream front. Agree Greg, let's just keep it because of the > stable side. Now republished, thanks! greg k-h