public inbox for ltp@lists.linux.it
 help / color / mirror / Atom feed
From: Petr Vorel <pvorel@suse.cz>
To: Andrea Cervesato <andrea.cervesato@suse.com>
Cc: ltp@lists.linux.it
Subject: Re: [LTP] [PATCH] cve: add CVE-2025-38236 test
Date: Tue, 12 Aug 2025 13:25:46 +0200	[thread overview]
Message-ID: <20250812112546.GA843668@pevik> (raw)
In-Reply-To: <8a13181b-5fbc-4a10-9904-24fd26cb1ebe@suse.com>

Hi Andrea,

...
> > > +		const char *msg = "We are able to read out-of-band data from normal stream";
> > > +
> > > +		if (dummy == 'A') {
> > > +			tst_res(TFAIL, "%s", msg);
> > > +		} else {
> > > +			tst_res(TFAIL, "%s, but data doesn't match: '%c' != 'A'",
> > > +				msg, dummy);
> > > +		}
> > > +
> > > +		SAFE_RECV(0, sock[0], &dummy, 1, MSG_OOB);
> > FYI: on vulnerable kernel with SELinux I get (nothing to be fixed):
> > cve-2025-38236.c:48: TINFO: Receive data from normal stream
> > cve-2025-38236.c:60: TFAIL: We are able to read out-of-band data from normal stream
> > cve-2025-38236.c:66: TBROK: recv(3, 0x4391d8, 1, 1) failed: EFAULT (14)
> Maybe we can verify at the beginning is SELinux is enabled. I don't know...

I would not do that. I'm not sure if SELinux mitigates the problem (IMHO not)
and on fixed kernel (also with SELinux) recv() works:

cve-2025-38236.c:53: TPASS: Can't read out-of-band data from normal stream

It's just a note that it's different. Fortunately there is also TFAIL,
thus it's obvious kernel is vulnerable.

And again, there is the trap with LSM modules: what about the others? At least
AppArmor (still widely used, although less than SELinux).

Tested-by: Petr Vorel <pvorel@suse.cz>

> > > +
> > > +		tst_res(TFAIL, "We are able to access data from skb queue (use-after-free)");
> > > +	}
> > > +}
> > > +
> > > +static void setup(void)
> > > +{
> > > +	SAFE_SOCKETPAIR(AF_UNIX, SOCK_STREAM, 0, sock);
> > > +	SAFE_SETSOCKOPT(sock[0], SOL_SOCKET, SO_RCVTIMEO,
> > > +		 &sock_timeout, sizeof(struct timeval));
> > > +}
> > Why is struct timeval needed? I haven't found that in
> > https://project-zero.issues.chromium.org/issues/423023990
> > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32ca245464e1

> > and test works as a verifier without it. If really not needed please remove it
> > before merge.
> We need to set a timeout for recv(), otherwise it will stuck on systems
> which are not bugged.

Indeed.

...
> > > +static struct tst_test test = {
> > > +	.test_all = run,
> > > +	.setup = setup,
> > > +	.cleanup = cleanup,
> > > +	.needs_kconfigs = (const char *[]) {
> > > +		"CONFIG_AF_UNIX_OOB=y",
> > Although this is true I wonder if we should limit the reproducer to this.
> > If one day config silently renames / is removed (but OOB kept) the reproducer
> > will be lost.
> That's valid in general, I can remove it but I don't know if it makes much
> sense, considering that feature something which is nowadays disabled in many
> systems due to this bug.

Fair enough. More important is that MSG_OOB most certainly require
CONFIG_AF_UNIX_OOB, so it's probably correct to have it.

Kind regards,
Petr

-- 
Mailing list info: https://lists.linux.it/listinfo/ltp

      parent reply	other threads:[~2025-08-12 11:26 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-12  8:45 [LTP] [PATCH] cve: add CVE-2025-38236 test Andrea Cervesato
2025-08-12  9:43 ` Wei Gao via ltp
2025-08-12 10:57   ` Andrea Cervesato via ltp
2025-08-12 11:09     ` Petr Vorel
2025-08-12 10:12 ` Petr Vorel
2025-08-12 11:09   ` Cyril Hrubis
2025-08-12 11:45     ` [LTP] [doc, runtest] [was: Re: [PATCH] cve: add CVE-2025-38236 test] Petr Vorel
2025-08-12 12:09       ` Cyril Hrubis
2025-08-18  6:08         ` Petr Vorel
2025-08-12 10:51 ` [LTP] [PATCH] cve: add CVE-2025-38236 test Petr Vorel
2025-08-12 10:55   ` Andrea Cervesato via ltp
2025-08-12 11:14     ` Cyril Hrubis
2025-08-12 11:17       ` Andrea Cervesato via ltp
2025-08-12 11:50       ` Petr Vorel
2025-08-12 11:25     ` Petr Vorel [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250812112546.GA843668@pevik \
    --to=pvorel@suse.cz \
    --cc=andrea.cervesato@suse.com \
    --cc=ltp@lists.linux.it \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox