[kernel] r4756 - in dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian: . patches

Simon Horman horms at costa.debian.org
Wed Nov 9 04:37:10 UTC 2005


Author: horms
Date: Wed Nov  9 04:37:06 2005
New Revision: 4756

Added:
   dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/cve-2005-2709-sysctl-unregistration-oops.dpatch
Modified:
   dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
Log:
[SECURITY] sysctl unregistration oops. See CVE-2005-2709

Modified: dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
==============================================================================
--- dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	(original)
+++ dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	Wed Nov  9 04:37:06 2005
@@ -334,12 +334,16 @@
   * net-ipv6-udp_v6_get_port-loop.dpatch
     [SECURITY] Fix infinite loop in udp_v6_get_port().  See CVE-2005-2973
 
+  * cve-2005-2709-sysctl-unregistration-oops.dpatch
+    [SECURITY] sysctl unregistration oops. See CVE-2005-2709
+    Will be in 2.6.14.1
+
   [ dann frazier ]
   * mempolicy-check-mode.dpatch
     [SECURITY] Input validation in sys_set_mempolicy(); local DoS.
     See CAN-2005-3053
 
- -- Simon Horman <horms at debian.org>  Fri, 28 Oct 2005 18:18:10 +0900
+ -- Simon Horman <horms at debian.org>  Wed,  9 Nov 2005 13:35:26 +0900
 
 kernel-source-2.6.8 (2.6.8-16) unstable; urgency=low
 

Added: dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/cve-2005-2709-sysctl-unregistration-oops.dpatch
==============================================================================
--- (empty file)
+++ dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/cve-2005-2709-sysctl-unregistration-oops.dpatch	Wed Nov  9 04:37:06 2005
@@ -0,0 +1,313 @@
+From security-bounces at linux.kernel.org Tue Nov  8 07:05:26 2005
+Date: Tue, 8 Nov 2005 15:03:46 +0000 (GMT)
+From: Mark J Cox <mjc at redhat.com>
+To: security at kernel.org
+Message-ID: <0511081502560.8682 at dell1.moose.awe.com>
+Cc: aviro at redhat.com, vendor-sec at lst.de
+Subject: CVE-2005-2709 sysctl unregistration oops
+
+From: Al Viro <viro at zeniv.linux.org.uk>
+
+You could open the /proc/sys/net/ipv4/conf/<if>/<whatever> file, then
+wait for interface to go away, try to grab as much memory as possible in
+hope to hit the (kfreed) ctl_table.  Then fill it with pointers to your
+function. Then do read from file you've opened and if you are lucky,
+you'll get it called as ->proc_handler() in kernel mode.
+
+So this is at least an Oops and possibly more.  It does depend on an
+interface going away though, so less of a security risk than it would
+otherwise be.
+
+Signed-off-by: Greg Kroah-Hartman <gregkh at suse.de>
+
+Backported to Debian's 2.6.8 by Horms
+
+--- from-0001/arch/s390/appldata/appldata_base.c
++++ to-work/arch/s390/appldata/appldata_base.c	2005-11-09 13:23:21.000000000 +0900
+@@ -583,12 +583,16 @@ int appldata_register_ops(struct appldat
+  */
+ void appldata_unregister_ops(struct appldata_ops *ops)
+ {
++	void *table;
+ 	spin_lock_bh(&appldata_ops_lock);
+-	unregister_sysctl_table(ops->sysctl_header);
+ 	list_del(&ops->list);
++	/* at that point any incoming access will fail */
++	table = ops->ctl_table;
+ 	kfree(ops->ctl_table);
+ 	ops->ctl_table = NULL;
+ 	spin_unlock_bh(&appldata_ops_lock);
++	unregister_sysctl_table(ops->sysctl_header);
++	kfree(table);
+ 	P_INFO("%s-ops unregistered!\n", ops->name);
+ }
+ /********************** module-ops management <END> **************************/
+--- from-0001/include/linux/proc_fs.h
++++ to-work/include/linux/proc_fs.h	2005-11-09 13:16:30.000000000 +0900
+@@ -66,6 +66,7 @@ struct proc_dir_entry {
+ 	write_proc_t *write_proc;
+ 	atomic_t count;		/* use count */
+ 	int deleted;		/* delete flag */
++	void *set;
+ };
+ 
+ struct kcore_list {
+--- from-0001/include/linux/sysctl.h
++++ to-work/include/linux/sysctl.h	2005-11-09 13:16:30.000000000 +0900
+@@ -24,6 +24,7 @@
+ #include <linux/compiler.h>
+ 
+ struct file;
++struct completion;
+ 
+ #define CTL_MAXNAME 10		/* how many path components do we allow in a
+ 				   call to sysctl?   In other words, what is
+@@ -854,6 +855,8 @@ struct ctl_table_header
+ {
+ 	ctl_table *ctl_table;
+ 	struct list_head ctl_entry;
++	int used;
++	struct completion *unregistering;
+ };
+ 
+ struct ctl_table_header * register_sysctl_table(ctl_table * table, 
+--- from-0001/kernel/sysctl.c
++++ to-work/kernel/sysctl.c	2005-11-09 13:21:10.000000000 +0900
+@@ -159,7 +159,7 @@ struct file_operations proc_sys_file_ope
+ 
+ extern struct proc_dir_entry *proc_sys_root;
+ 
+-static void register_proc_table(ctl_table *, struct proc_dir_entry *);
++static void register_proc_table(ctl_table *, struct proc_dir_entry *, void *);
+ static void unregister_proc_table(ctl_table *, struct proc_dir_entry *);
+ #endif
+ 
+@@ -912,10 +912,51 @@ static ctl_table dev_table[] = {
+ 
+ extern void init_irq_proc (void);
+ 
++static DEFINE_SPINLOCK(sysctl_lock);
++
++/* called under sysctl_lock */
++static int use_table(struct ctl_table_header *p)
++{
++	if (unlikely(p->unregistering))
++		return 0;
++	p->used++;
++	return 1;
++}
++
++/* called under sysctl_lock */
++static void unuse_table(struct ctl_table_header *p)
++{
++	if (!--p->used)
++		if (unlikely(p->unregistering))
++			complete(p->unregistering);
++}
++
++/* called under sysctl_lock, will reacquire if has to wait */
++static void start_unregistering(struct ctl_table_header *p)
++{
++	/*
++	 * if p->used is 0, nobody will ever touch that entry again;
++	 * we'll eliminate all paths to it before dropping sysctl_lock
++	 */
++	if (unlikely(p->used)) {
++		struct completion wait;
++		init_completion(&wait);
++		p->unregistering = &wait;
++		spin_unlock(&sysctl_lock);
++		wait_for_completion(&wait);
++		spin_lock(&sysctl_lock);
++	}
++	/*
++	 * do not remove from the list until nobody holds it; walking the
++	 * list in do_sysctl() relies on that.
++	 */
++	list_del_init(&p->ctl_entry);
++}
++
+ void __init sysctl_init(void)
+ {
+ #ifdef CONFIG_PROC_FS
+-	register_proc_table(root_table, proc_sys_root);
++	register_proc_table(root_table, proc_sys_root, &root_table_header);
+ 	init_irq_proc();
+ #endif
+ }
+@@ -924,6 +965,7 @@ int do_sysctl(int __user *name, int nlen
+ 	       void __user *newval, size_t newlen)
+ {
+ 	struct list_head *tmp;
++	int error = -ENOTDIR;
+ 
+ 	if (nlen <= 0 || nlen >= CTL_MAXNAME)
+ 		return -ENOTDIR;
+@@ -932,21 +974,31 @@ int do_sysctl(int __user *name, int nlen
+ 		if (!oldlenp || get_user(old_len, oldlenp))
+ 			return -EFAULT;
+ 	}
++	spin_lock(&sysctl_lock);
+ 	tmp = &root_table_header.ctl_entry;
+ 	do {
+ 		struct ctl_table_header *head =
+ 			list_entry(tmp, struct ctl_table_header, ctl_entry);
+ 		void *context = NULL;
+-		int error = parse_table(name, nlen, oldval, oldlenp, 
++
++		if (!use_table(head))
++			continue;
++
++		spin_unlock(&sysctl_lock);
++
++		error = parse_table(name, nlen, oldval, oldlenp, 
+ 					newval, newlen, head->ctl_table,
+ 					&context);
+-		if (context)
+-			kfree(context);
++		kfree(context);
++
++		spin_lock(&sysctl_lock);
++		unuse_table(head);
+ 		if (error != -ENOTDIR)
+-			return error;
++			break;
+ 		tmp = tmp->next;
+-	} while (tmp != &root_table_header.ctl_entry);
+-	return -ENOTDIR;
++	} while ((tmp = tmp->next) != &root_table_header.ctl_entry);
++	spin_unlock(&sysctl_lock);
++	return error;
+ }
+ 
+ asmlinkage long sys_sysctl(struct __sysctl_args __user *args)
+@@ -1157,12 +1209,16 @@ struct ctl_table_header *register_sysctl
+ 		return NULL;
+ 	tmp->ctl_table = table;
+ 	INIT_LIST_HEAD(&tmp->ctl_entry);
++	tmp->used = 0;
++	tmp->unregistering = NULL;
++	spin_lock(&sysctl_lock);
+ 	if (insert_at_head)
+ 		list_add(&tmp->ctl_entry, &root_table_header.ctl_entry);
+ 	else
+ 		list_add_tail(&tmp->ctl_entry, &root_table_header.ctl_entry);
++	spin_unlock(&sysctl_lock);
+ #ifdef CONFIG_PROC_FS
+-	register_proc_table(table, proc_sys_root);
++	register_proc_table(table, proc_sys_root, tmp);
+ #endif
+ 	return tmp;
+ }
+@@ -1176,10 +1232,13 @@ struct ctl_table_header *register_sysctl
+  */
+ void unregister_sysctl_table(struct ctl_table_header * header)
+ {
+-	list_del(&header->ctl_entry);
++	might_sleep();
++	spin_lock(&sysctl_lock);
++	start_unregistering(header);
+ #ifdef CONFIG_PROC_FS
+ 	unregister_proc_table(header->ctl_table, proc_sys_root);
+ #endif
++	spin_unlock(&sysctl_lock);
+ 	kfree(header);
+ }
+ 
+@@ -1190,7 +1249,7 @@ void unregister_sysctl_table(struct ctl_
+ #ifdef CONFIG_PROC_FS
+ 
+ /* Scan the sysctl entries in table and add them all into /proc */
+-static void register_proc_table(ctl_table * table, struct proc_dir_entry *root)
++static void register_proc_table(ctl_table * table, struct proc_dir_entry *root, void *set)
+ {
+ 	struct proc_dir_entry *de;
+ 	int len;
+@@ -1226,13 +1285,14 @@ static void register_proc_table(ctl_tabl
+ 			de = create_proc_entry(table->procname, mode, root);
+ 			if (!de)
+ 				continue;
++			de->set = set;
+ 			de->data = (void *) table;
+ 			if (table->proc_handler)
+ 				de->proc_fops = &proc_sys_file_operations;
+ 		}
+ 		table->de = de;
+ 		if (de->mode & S_IFDIR)
+-			register_proc_table(table->child, de);
++			register_proc_table(table->child, de, set);
+ 	}
+ }
+ 
+@@ -1257,6 +1317,13 @@ static void unregister_proc_table(ctl_ta
+ 				continue;
+ 		}
+ 
++		/*
++		 * In any case, mark the entry as goner; we'll keep it
++		 * around if it's busy, but we'll know to do nothing with
++		 * its fields.  We are under sysctl_lock here.
++		 */
++		de->data = NULL;
++
+ 		/* Don't unregister proc entries that are still being used.. */
+ 		if (atomic_read(&de->count))
+ 			continue;
+@@ -1270,27 +1337,38 @@ static ssize_t do_rw_proc(int write, str
+ 			  size_t count, loff_t *ppos)
+ {
+ 	int op;
+-	struct proc_dir_entry *de;
++	struct proc_dir_entry *de = PDE(file->f_dentry->d_inode);
+ 	struct ctl_table *table;
+ 	size_t res;
+-	ssize_t error;
+-	
+-	de = PDE(file->f_dentry->d_inode);
+-	if (!de || !de->data)
+-		return -ENOTDIR;
+-	table = (struct ctl_table *) de->data;
+-	if (!table || !table->proc_handler)
+-		return -ENOTDIR;
+-	op = (write ? 002 : 004);
+-	if (ctl_perm(table, op))
+-		return -EPERM;
++	ssize_t error = -ENOTDIR;
+ 	
+-	res = count;
+-
+-	error = (*table->proc_handler) (table, write, file, buf, &res, ppos);
+-	if (error)
+-		return error;
+-	return res;
++	spin_lock(&sysctl_lock);
++	if (de && de->data && use_table(de->set)) {
++		/*
++		 * at that point we know that sysctl was not unregistered
++		 * and won't be until we finish
++		 */
++		spin_unlock(&sysctl_lock);
++		table = (struct ctl_table *) de->data;
++		if (!table || !table->proc_handler)
++			goto out;
++		error = -EPERM;
++		op = (write ? 002 : 004);
++		if (ctl_perm(table, op))
++			goto out;
++		
++		/* careful: calling conventions are nasty here */
++		res = count;
++		error = (*table->proc_handler)(table, write, file,
++						buf, &res, ppos);
++		if (!error)
++			error = res;
++	out:
++		spin_lock(&sysctl_lock);
++		unuse_table(de->set);
++	}
++	spin_unlock(&sysctl_lock);
++	return error;
+ }
+ 
+ static int proc_opensys(struct inode *inode, struct file *file)
+



More information about the Kernel-svn-changes mailing list