From patchwork Fri Oct 2 11:20:52 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andy Whitcroft X-Patchwork-Id: 525458 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) by ozlabs.org (Postfix) with ESMTP id A9CD81402F0; Fri, 2 Oct 2015 21:21:12 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.76) (envelope-from ) id 1ZhyOg-0000TD-OL; Fri, 02 Oct 2015 11:21:06 +0000 Received: from mail-wi0-f171.google.com ([209.85.212.171]) by huckleberry.canonical.com with esmtp (Exim 4.76) (envelope-from ) id 1ZhyOX-0000MM-Lo for kernel-team@lists.ubuntu.com; Fri, 02 Oct 2015 11:20:57 +0000 Received: by wicge5 with SMTP id ge5so28561898wic.0 for ; Fri, 02 Oct 2015 04:20:57 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=1qzXes2lnCfee2jZTm3OnVBUiT56sWl5Sq9t/E5W4nE=; b=khmZauHqkvQ3KlqbtZFJ6jti5GlDPEVmQ5Ad8blUbX6BWabTYIED0JuAkZ2OkIOzLB 2weOdJYSm9zZaV2JXOGJ0Dov3Ep+cyclINvqxeA7VfS1AjEsmLR7SLiG9w79iMmUB4w+ YRFuIFc2+tuIPuRr4HjALDRQVv5My9zcz9MddfsJewQB8B8pzXpIzDaDvdSD2YMz0rcL ZD4LIk6jdxWNt6gFx/YchxsunnX2bfllRuwoIoiJ5K2LhLTOw4tda+0mldiPCrwPmSty 5WBTqdrMRbIlnyXd12D8P9YPv4l7jcMb+SmKD8QjaUtc8OfpoC80CT635UBTF3MgcRFF aQRg== X-Gm-Message-State: ALoCoQm6GS0MFOjyj5pOZ2JnlPNyOXTRpw0ZlPqUtHJXUVHUU/yJyfAt4pliULg6TCxg6gHXGsZs X-Received: by 10.194.171.69 with SMTP id as5mr15552201wjc.137.1443784857479; Fri, 02 Oct 2015 04:20:57 -0700 (PDT) Received: from localhost ([2001:470:6973:2:cde0:bb8:21a1:928c]) by smtp.gmail.com with ESMTPSA id pl7sm7907871wic.4.2015.10.02.04.20.56 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 02 Oct 2015 04:20:56 -0700 (PDT) From: Andy Whitcroft To: kernel-team@lists.ubuntu.com Subject: [trusty/lts-backport-utopic 1/1] UBUNTU: SAUCE: aufs3: mmap: Fix races in madvise_remove() and sys_msync() Date: Fri, 2 Oct 2015 12:20:52 +0100 Message-Id: <1443784854-29493-2-git-send-email-apw@canonical.com> X-Mailer: git-send-email 2.5.0 In-Reply-To: <1443784854-29493-1-git-send-email-apw@canonical.com> References: <1443784854-29493-1-git-send-email-apw@canonical.com> Cc: Andy Whitcroft X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.14 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: kernel-team-bounces@lists.ubuntu.com From: Ben Hutchings In madvise_remove() and sys_msync() we drop the mmap_sem before dropping references to the mapped file(s). As soon as we drop the mmap_sem, the vma we got them from might be destroyed by another thread, so calling vma_do_fput() is a possible use-after-free. In these cases we don't actually need a reference to the aufs file, so revert to using get_file() and fput() directly. Bug-Link: https://bugs.debian.org/796036 CVE-2015-7312 Signed-off-by: Ben Hutchings Signed-off-by: Andy Whitcroft --- mm/madvise.c | 4 ++-- mm/msync.c | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/mm/madvise.c b/mm/madvise.c index 8fa9f2a..2f9b533 100644 --- a/mm/madvise.c +++ b/mm/madvise.c @@ -328,12 +328,12 @@ static long madvise_remove(struct vm_area_struct *vma, * vma's reference to the file) can go away as soon as we drop * mmap_sem. */ - vma_get_file(vma); + get_file(vma); up_read(¤t->mm->mmap_sem); error = do_fallocate(f, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, offset, end - start); - vma_fput(vma); + fput(vma); down_read(¤t->mm->mmap_sem); return error; } diff --git a/mm/msync.c b/mm/msync.c index 69b7303..3cc63ea 100644 --- a/mm/msync.c +++ b/mm/msync.c @@ -85,13 +85,13 @@ SYSCALL_DEFINE3(msync, unsigned long, start, size_t, len, int, flags) start = vma->vm_end; if ((flags & MS_SYNC) && file && (vma->vm_flags & VM_SHARED)) { - vma_get_file(vma); + get_file(vma); up_read(&mm->mmap_sem); if (vma->vm_flags & VM_NONLINEAR) error = vfs_fsync(file, 1); else error = vfs_fsync_range(file, fstart, fend, 1); - vma_fput(vma); + fput(vma); if (error || start >= end) goto out; down_read(&mm->mmap_sem);