|
|
1d4ef1 |
From bdeb7f1c4651240043b0b8a2a5432fc9760cfadf Mon Sep 17 00:00:00 2001
|
|
|
1d4ef1 |
From: Joe Lawrence <joe.lawrence@redhat.com>
|
|
|
1d4ef1 |
Date: Wed, 15 Jun 2022 16:10:31 -0400
|
|
|
1d4ef1 |
Subject: [KPATCH CVE-2022-1966] kpatch fixes for CVE-2022-1966
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Kernels:
|
|
|
1d4ef1 |
3.10.0-1160.36.2.el7
|
|
|
1d4ef1 |
3.10.0-1160.41.1.el7
|
|
|
1d4ef1 |
3.10.0-1160.42.2.el7
|
|
|
1d4ef1 |
3.10.0-1160.45.1.el7
|
|
|
1d4ef1 |
3.10.0-1160.49.1.el7
|
|
|
1d4ef1 |
3.10.0-1160.53.1.el7
|
|
|
1d4ef1 |
3.10.0-1160.59.1.el7
|
|
|
1d4ef1 |
3.10.0-1160.62.1.el7
|
|
|
1d4ef1 |
3.10.0-1160.66.1.el7
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Changes since last build:
|
|
|
1d4ef1 |
arches: x86_64 ppc64le
|
|
|
1d4ef1 |
nf_tables_api.o: changed function: nft_expr_init
|
|
|
1d4ef1 |
nft_dynset.o: changed function: nft_dynset_init
|
|
|
1d4ef1 |
---------------------------
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Kpatch-MR: https://gitlab.com/redhat/prdsc/rhel/src/kpatch/rhel-7/-/merge_requests/42
|
|
|
1d4ef1 |
Approved-by: Yannick Cote (@ycote1)
|
|
|
1d4ef1 |
Modifications: none
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
commit c511e60bebd0546f8ec47a3c1691ab01d262b8e4
|
|
|
1d4ef1 |
Author: Phil Sutter <psutter@redhat.com>
|
|
|
1d4ef1 |
Date: Fri Jun 3 16:54:42 2022 +0200
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
netfilter: nf_tables: fix memory leak if expr init fails
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2093000
|
|
|
1d4ef1 |
Upstream Status: commit 6cafaf4764a32
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
commit 6cafaf4764a32597c2195aa5411b87728e1fde8a
|
|
|
1d4ef1 |
Author: Liping Zhang <liping.zhang@spreadtrum.com>
|
|
|
1d4ef1 |
Date: Mon Jun 20 21:11:45 2016 +0800
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
netfilter: nf_tables: fix memory leak if expr init fails
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
If expr init fails then we need to free it.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
So when the user add a nft rule as follows:
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
# nft add rule filter input tcp dport 22 flow table ssh \
|
|
|
1d4ef1 |
{ ip saddr limit rate 0/second }
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
memory leak will happen.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Signed-off-by: Liping Zhang <liping.zhang@spreadtrum.com>
|
|
|
1d4ef1 |
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Signed-off-by: Phil Sutter <psutter@redhat.com>
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
commit 4a4cc18bcf8f43c93dbf39cb52308dfaea4ec346
|
|
|
1d4ef1 |
Author: Phil Sutter <psutter@redhat.com>
|
|
|
1d4ef1 |
Date: Fri Jun 3 16:54:43 2022 +0200
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
netfilter: nf_tables: disallow non-stateful expression in sets earlier
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2093000
|
|
|
1d4ef1 |
Upstream Status: net.git commit 520778042ccca
|
|
|
1d4ef1 |
CVE: CVE-2022-1966
|
|
|
1d4ef1 |
Conflicts:
|
|
|
1d4ef1 |
* RHEL7 does not have nft_set_elem_expr_alloc(), remove
|
|
|
1d4ef1 |
NFT_EXPR_STATEFUL check from nft_dynset_init() instead
|
|
|
1d4ef1 |
* Context change in nft_expr_init() as RHEL7 does not have .release_ops
|
|
|
1d4ef1 |
* Adjusted new NFT_EXPR_STATEFUL check as upstream renamed 'info' into
|
|
|
1d4ef1 |
'expr_info'
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
commit 520778042ccca019f3ffa136dd0ca565c486cedd
|
|
|
1d4ef1 |
Author: Pablo Neira Ayuso <pablo@netfilter.org>
|
|
|
1d4ef1 |
Date: Wed May 25 10:36:38 2022 +0200
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
netfilter: nf_tables: disallow non-stateful expression in sets earlier
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Since 3e135cd499bf ("netfilter: nft_dynset: dynamic stateful expression
|
|
|
1d4ef1 |
instantiation"), it is possible to attach stateful expressions to set
|
|
|
1d4ef1 |
elements.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
cd5125d8f518 ("netfilter: nf_tables: split set destruction in deactivate
|
|
|
1d4ef1 |
and destroy phase") introduces conditional destruction on the object to
|
|
|
1d4ef1 |
accomodate transaction semantics.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
nft_expr_init() calls expr->ops->init() first, then check for
|
|
|
1d4ef1 |
NFT_STATEFUL_EXPR, this stills allows to initialize a non-stateful
|
|
|
1d4ef1 |
lookup expressions which points to a set, which might lead to UAF since
|
|
|
1d4ef1 |
the set is not properly detached from the set->binding for this case.
|
|
|
1d4ef1 |
Anyway, this combination is non-sense from nf_tables perspective.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
This patch fixes this problem by checking for NFT_STATEFUL_EXPR before
|
|
|
1d4ef1 |
expr->ops->init() is called.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
The reporter provides a KASAN splat and a poc reproducer (similar to
|
|
|
1d4ef1 |
those autogenerated by syzbot to report use-after-free errors). It is
|
|
|
1d4ef1 |
unknown to me if they are using syzbot or if they use similar automated
|
|
|
1d4ef1 |
tool to locate the bug that they are reporting.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
For the record, this is the KASAN splat.
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
[ 85.431824] ==================================================================
|
|
|
1d4ef1 |
[ 85.432901] BUG: KASAN: use-after-free in nf_tables_bind_set+0x81b/0xa20
|
|
|
1d4ef1 |
[ 85.433825] Write of size 8 at addr ffff8880286f0e98 by task poc/776
|
|
|
1d4ef1 |
[ 85.434756]
|
|
|
1d4ef1 |
[ 85.434999] CPU: 1 PID: 776 Comm: poc Tainted: G W 5.18.0+ #2
|
|
|
1d4ef1 |
[ 85.436023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Fixes: 0b2d8a7b638b ("netfilter: nf_tables: add helper functions for expression handling")
|
|
|
1d4ef1 |
Reported-and-tested-by: Aaron Adams <edg-e@nccgroup.com>
|
|
|
1d4ef1 |
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Signed-off-by: Phil Sutter <psutter@redhat.com>
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
Signed-off-by: Joe Lawrence <joe.lawrence@redhat.com>
|
|
|
1d4ef1 |
---
|
|
|
1d4ef1 |
net/netfilter/nf_tables_api.c | 16 +++++++++++-----
|
|
|
1d4ef1 |
net/netfilter/nft_dynset.c | 4 ----
|
|
|
1d4ef1 |
2 files changed, 11 insertions(+), 9 deletions(-)
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c
|
|
|
1d4ef1 |
index 0f46d90715a3..44738b987690 100644
|
|
|
1d4ef1 |
--- a/net/netfilter/nf_tables_api.c
|
|
|
1d4ef1 |
+++ b/net/netfilter/nf_tables_api.c
|
|
|
1d4ef1 |
@@ -1739,21 +1739,27 @@ struct nft_expr *nft_expr_init(const struct nft_ctx *ctx,
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
err = nf_tables_expr_parse(ctx, nla, &info;;
|
|
|
1d4ef1 |
if (err < 0)
|
|
|
1d4ef1 |
- goto err1;
|
|
|
1d4ef1 |
+ goto err_expr_parse;
|
|
|
1d4ef1 |
+
|
|
|
1d4ef1 |
+ err = -EOPNOTSUPP;
|
|
|
1d4ef1 |
+ if (!(info.ops->type->flags & NFT_EXPR_STATEFUL))
|
|
|
1d4ef1 |
+ goto err_expr_stateful;
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
err = -ENOMEM;
|
|
|
1d4ef1 |
expr = kzalloc(info.ops->size, GFP_KERNEL);
|
|
|
1d4ef1 |
if (expr == NULL)
|
|
|
1d4ef1 |
- goto err2;
|
|
|
1d4ef1 |
+ goto err_expr_stateful;
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
err = nf_tables_newexpr(ctx, &info, expr);
|
|
|
1d4ef1 |
if (err < 0)
|
|
|
1d4ef1 |
- goto err2;
|
|
|
1d4ef1 |
+ goto err_expr_new;
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
return expr;
|
|
|
1d4ef1 |
-err2:
|
|
|
1d4ef1 |
+err_expr_new:
|
|
|
1d4ef1 |
+ kfree(expr);
|
|
|
1d4ef1 |
+err_expr_stateful:
|
|
|
1d4ef1 |
module_put(info.ops->type->owner);
|
|
|
1d4ef1 |
-err1:
|
|
|
1d4ef1 |
+err_expr_parse:
|
|
|
1d4ef1 |
return ERR_PTR(err);
|
|
|
1d4ef1 |
}
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
diff --git a/net/netfilter/nft_dynset.c b/net/netfilter/nft_dynset.c
|
|
|
1d4ef1 |
index 3f9f8e82716e..0cf187230050 100644
|
|
|
1d4ef1 |
--- a/net/netfilter/nft_dynset.c
|
|
|
1d4ef1 |
+++ b/net/netfilter/nft_dynset.c
|
|
|
1d4ef1 |
@@ -174,10 +174,6 @@ static int nft_dynset_init(const struct nft_ctx *ctx,
|
|
|
1d4ef1 |
priv->expr = nft_expr_init(ctx, tb[NFTA_DYNSET_EXPR]);
|
|
|
1d4ef1 |
if (IS_ERR(priv->expr))
|
|
|
1d4ef1 |
return PTR_ERR(priv->expr);
|
|
|
1d4ef1 |
-
|
|
|
1d4ef1 |
- err = -EOPNOTSUPP;
|
|
|
1d4ef1 |
- if (!(priv->expr->ops->type->flags & NFT_EXPR_STATEFUL))
|
|
|
1d4ef1 |
- goto err1;
|
|
|
1d4ef1 |
} else if (set->flags & NFT_SET_EVAL)
|
|
|
1d4ef1 |
return -EINVAL;
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
--
|
|
|
1d4ef1 |
2.34.3
|
|
|
1d4ef1 |
|
|
|
1d4ef1 |
|