From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrey Ryabinin Subject: Re: net: socket: NULL ptr deref in sendmsg Date: Sat, 26 Jul 2014 19:40:51 +0400 Message-ID: References: <53C2FF3D.4030201@oracle.com> <53D2768E.2040902@samsung.com> <53D2C38A.70601@oracle.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Cc: Andrey Ryabinin , "David S. Miller" , "netdev@vger.kernel.org" , LKML , Dave Jones , Hannes Frederic Sowa , Eric Dumazet To: Sasha Levin Return-path: In-Reply-To: <53D2C38A.70601@oracle.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org 2014-07-26 0:52 GMT+04:00 Sasha Levin : > On 07/25/2014 11:23 AM, Andrey Ryabinin wrote: >> After this report there was no usual "Unable to handle kernel NULL pointer dereference" >> and this gave me a clue that address 0 is mapped and contains valid socket address structure in it. > > Interesting. Does it mean that all network protocols that check it for being NULL instead of checking > the length are incorrect? > I think they are correct. After verify_iovec() we should have either both msg->msg_name == 0 and msg->msg_namelen == 0, or both != 0 (and msg_name should be a kernel address). That bug allows to leave verify_iovec() with msg_namelen > 0 and msg_name == NULL, causing troubles for protocols checking only msg_namelen. > (such as:) > > if (msg->msg_name) { > DECLARE_SOCKADDR(struct sockaddr_can *, addr, msg->msg_name); > > [...] > > > Thanks, > Sasha > -- Best regards, Andrey Ryabinin