In the Linux kernel, the following vulnerability has been resolved:
tipc: fix kernel panic when enabling bearer
When enabling a bearer on a node, a kernel panic is observed:
[ 4.498085] RIP: 0010:tipcmonprep+0x4e/0x130 [tipc] ... [ 4.520030] Call Trace: [ 4.520689] <IRQ> [ 4.521236] tipclinkbuildprotomsg+0x375/0x750 [tipc] [ 4.522654] tipclinkbuildstatemsg+0x48/0xc0 [tipc] [ 4.524034] _tipcnodelinkup+0xd7/0x290 [tipc] [ 4.525292] tipcrcv+0x5da/0x730 [tipc] [ 4.526346] ? _netifreceiveskbcore+0xb7/0xfc0 [ 4.527601] tipcl2rcvmsg+0x5e/0x90 [tipc] [ 4.528737] _netifreceiveskblistcore+0x20b/0x260 [ 4.530068] netifreceiveskblistinternal+0x1bf/0x2e0 [ 4.531450] ? devgroreceive+0x4c2/0x680 [ 4.532512] napicompletedone+0x6f/0x180 [ 4.533570] virtnetpoll+0x29c/0x42e [virtio_net] ...
The node in question is receiving activate messages in another thread after changing bearer status to allow message sending/ receiving in current thread:
thread 1 | thread 2
-------- | --------
|
tipcenablebearer() | testandsetbitlock() | tipcbearerxmitskb() | | tipcl2rcvmsg() | tipcrcv() | _tipcnodelinkup() | tipclinkbuildstatemsg() | tipclinkbuildprotomsg() | tipcmonprep() | { | ... | // null-pointer dereference | u16 gen = mon->domgen; | ... | } // Not being executed yet | tipcmoncreate() | { | ... | // allocate | mon = kzalloc(); | ... | } |
Monitoring pointer in thread 2 is dereferenced before monitoring data is allocated in thread 1. This causes kernel panic.
This commit fixes it by allocating the monitoring data before enabling the bearer to receive messages.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Line", "target": { "file": "net/tipc/bearer.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "260495014474219130192019687510802083277", "269521071537358867445350056628291965962", "195324117045704585866110040327687169022", "14789781464074043938415019305880145224", "190819356290755548526799921132613081558", "136463705290066715814988006907395510536", "15545066793421535326420348874242697674", "118652780174501687464958826698224165230", "19968785441936340380452332855070037196", "151798649054507161706994654001256375526", "216081378577141040465385909046938774628" ], "threshold": 0.9 }, "id": "CVE-2022-48865-02113960", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be4977b847f5d5cedb64d50eaaf2218c3a55a3a3" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "net/tipc/bearer.c", "function": "tipc_enable_bearer" }, "signature_version": "v1", "digest": { "length": 2782.0, "function_hash": "232756383241282899626418742109612803885" }, "id": "CVE-2022-48865-0bead8d4", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4f59fdbc748805b08c13dae14c01f0518c77c94" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "net/tipc/bearer.c", "function": "tipc_enable_bearer" }, "signature_version": "v1", "digest": { "length": 2782.0, "function_hash": "232756383241282899626418742109612803885" }, "id": "CVE-2022-48865-1401a30a", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be4977b847f5d5cedb64d50eaaf2218c3a55a3a3" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "net/tipc/bearer.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "260495014474219130192019687510802083277", "269521071537358867445350056628291965962", "195324117045704585866110040327687169022", "14789781464074043938415019305880145224", "190819356290755548526799921132613081558", "136463705290066715814988006907395510536", "15545066793421535326420348874242697674", "118652780174501687464958826698224165230", "19968785441936340380452332855070037196", "151798649054507161706994654001256375526", "216081378577141040465385909046938774628" ], "threshold": 0.9 }, "id": "CVE-2022-48865-32435529", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4f59fdbc748805b08c13dae14c01f0518c77c94" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "net/tipc/bearer.c", "function": "tipc_enable_bearer" }, "signature_version": "v1", "digest": { "length": 2782.0, "function_hash": "232756383241282899626418742109612803885" }, "id": "CVE-2022-48865-4e3b2233", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f96dc3adb9a97b8f3dfdb88796483491a3006b71" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "net/tipc/bearer.c", "function": "tipc_enable_bearer" }, "signature_version": "v1", "digest": { "length": 2782.0, "function_hash": "232756383241282899626418742109612803885" }, "id": "CVE-2022-48865-53d7dda7", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2de76d37d4a6dca9b96ea51da24d4290e6cfa1a5" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "net/tipc/bearer.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "260495014474219130192019687510802083277", "269521071537358867445350056628291965962", "195324117045704585866110040327687169022", "14789781464074043938415019305880145224", "190819356290755548526799921132613081558", "136463705290066715814988006907395510536", "15545066793421535326420348874242697674", "118652780174501687464958826698224165230", "19968785441936340380452332855070037196", "151798649054507161706994654001256375526", "216081378577141040465385909046938774628" ], "threshold": 0.9 }, "id": "CVE-2022-48865-a27046ed", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f96dc3adb9a97b8f3dfdb88796483491a3006b71" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "net/tipc/bearer.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "260495014474219130192019687510802083277", "269521071537358867445350056628291965962", "195324117045704585866110040327687169022", "14789781464074043938415019305880145224", "190819356290755548526799921132613081558", "136463705290066715814988006907395510536", "15545066793421535326420348874242697674", "118652780174501687464958826698224165230", "19968785441936340380452332855070037196", "151798649054507161706994654001256375526", "216081378577141040465385909046938774628" ], "threshold": 0.9 }, "id": "CVE-2022-48865-ab6b45db", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2de76d37d4a6dca9b96ea51da24d4290e6cfa1a5" } ] }