Bug 61341 - ipc/msg.c: Use after free with selinux
Summary: ipc/msg.c: Use after free with selinux
Status: RESOLVED CODE_FIX
Alias: None
Product: Other
Classification: Unclassified
Component: Other (show other bugs)
Hardware: All Linux
: P1 normal
Assignee: other_other
URL: http://marc.info/?l=linux-kernel&m=13...
Keywords:
Depends on:
Blocks: 62061
  Show dependency tree
 
Reported: 2013-09-15 10:53 UTC by Manfred Spraul
Modified: 2013-09-25 07:45 UTC (History)
0 users

See Also:
Kernel Version:
Subsystem:
Regression: Yes
Bisected commit-id:


Attachments

Description Manfred Spraul 2013-09-15 10:53:33 UTC
The synchronization between security_msg_xx and security_msg_free was modified without updating security/*.c.

This created an use-after-free race with security/selinux/hooks.c

Affected: 3.0.11, current head

Details:
Assume a preemptible kernel that is preempted just after
> isec = msq->q_perm.security;
in selinux_msg_queue_msgrcv.
The call happens just with rcu_read_lock().

Now the other thread calls whatever operations are necessary to end up in msg_freeque(), which calls security_msg_queue_free().
This ends up doing kfree(isec).

Note You need to log in before you can comment on or make changes to this bug.