Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAFcO6XNrZziaKNu=BGiHoKiK4sdHH4CJLKoptOyE=yQ5WWqaLQ@mail.gmail.com>
Date: Mon, 14 Nov 2022 11:10:21 +0800
From: butt3rflyh4ck <butterflyhuangxx@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux kernel: net: mctp: A Use-After-Free bug in
 mctp_sk_unhash in net/mctp/af_mctp.c

CVE-2022-3977 is assigned for this issue by Redhat.
https://access.redhat.com/security/cve/CVE-2022-3977


Regards,
 butt3rflyh4ck.

On Sun, Oct 23, 2022 at 1:51 PM butt3rflyh4ck
<butterflyhuangxx@...il.com> wrote:
>
> Hi, there is a Use-After-Free bug in mctp_sk_unhash in
> net/mctp/af_mctp.c in the last Linux kernel upstream.  An unprivileged
> the user  reproduced it with new namespaces.It would cause Local Privilege
> Escalation(LPE). It was introduced in v5.18.0, commit is
> 63ed1aab3d40aa61aaa66819bdce9377ac7f40fa. It affected all the way up
> to upstream v6.0.0 and stable. Unfortunately, the mctp kernel module
> is not automatically loaded.
> I have reported to secuirty@...nel.org a month ago and Now the patch
> was opened to the public.
>
> ##Root Cause
> The bug was introduced in commit
> 63ed1aab3d40aa61aaa66819bdce9377ac7f40fa. It add
> SIOCMCTP{ALLOC,DROP}TAG ioctls for tag control.This change adds a
> couple of new ioctls for mctp sockets: SIOCMCTPALLOCTAG and
> SIOCMCTPDROPTAG.
> where a simultaneous DROPTAG ioctl and socket close may race, as we
> attempt to remove a key from lists twice, and perform an unref for
> each removal operation. This may result in a uaf when we attempt the
> second unref.
>
> ##Fix
> 1.https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89
>
> ## CVE
> Now no CVE number is assigned for this issue.
>
> ##Timeline
> 2022-9-26: reported to security@...nel.org.
> 2022-9-26: bug confirmed.
> 2022-10-06: patch it.
> 2022-10-12: patch released.
> 2022-10-12: reported to secalert@...hat.com.
> 2022-10-23: Announced on oss-security lists.
>
> ## Credit
> this bus is reported by Active Defense Lab of Venustech.
>
>
>
> Regards,
>  butt3rflyh4ck.
>
>
> --
> Active Defense Lab of Venustech



-- 
Active Defense Lab of Venustech

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.