In the Linux kernel, the following vulnerability has been resolved:
net: restrict SO_REUSEPORT to inet sockets
After blamed commit, crypto sockets could accidentally be destroyed from RCU call back, as spotted by zyzbot [1].
Trying to acquire a mutex in RCU callback is not allowed.
Restrict SO_REUSEPORT socket option to inet sockets.
v1 of this patch supported TCP, UDP and SCTP sockets, but fcnal-test.sh test needed RAW and ICMP support.
[1] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:562 inatomic(): 1, irqsdisabled(): 0, nonblock: 0, pid: 24, name: ksoftirqd/1 preemptcount: 100, expected: 0 RCU nest depth: 0, expected: 0 1 lock held by ksoftirqd/1/24: #0: ffffffff8e937ba0 (rcucallback){....}-{0:0}, at: rculockacquire include/linux/rcupdate.h:337 [inline] #0: ffffffff8e937ba0 (rcucallback){....}-{0:0}, at: rcudobatch kernel/rcu/tree.c:2561 [inline] #0: ffffffff8e937ba0 (rcucallback){....}-{0:0}, at: rcucore+0xa37/0x17a0 kernel/rcu/tree.c:2823 Preemption disabled at: [<ffffffff8161c8c8>] softirqhandlebegin kernel/softirq.c:402 [inline] [<ffffffff8161c8c8>] handlesoftirqs+0x128/0x9b0 kernel/softirq.c:537 CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00174-ga024e377efed #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> _dumpstack lib/dumpstack.c:94 [inline] dumpstacklvl+0x241/0x360 lib/dumpstack.c:120 _mightresched+0x5d4/0x780 kernel/sched/core.c:8758 _mutexlockcommon kernel/locking/mutex.c:562 [inline] _mutexlock+0x131/0xee0 kernel/locking/mutex.c:735 cryptoputdefaultnullskcipher+0x18/0x70 crypto/cryptonull.c:179 aeadrelease+0x3d/0x50 crypto/algifaead.c:489 algdorelease crypto/afalg.c:118 [inline] algsockdestruct+0x86/0xc0 crypto/afalg.c:502 _skdestruct+0x58/0x5f0 net/core/sock.c:2260 rcudobatch kernel/rcu/tree.c:2567 [inline] rcucore+0xaaa/0x17a0 kernel/rcu/tree.c:2823 handlesoftirqs+0x2d4/0x9b0 kernel/softirq.c:561 runksoftirqd+0xca/0x130 kernel/softirq.c:950 smpbootthreadfn+0x544/0xa30 kernel/smpboot.c:164 kthread+0x2f0/0x390 kernel/kthread.c:389 retfromfork+0x4b/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244 </TASK>
[
{
"digest": {
"length": 8848.0,
"function_hash": "3759814391136717528004931579498822559"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3257813a3ae7462ac5cde04e120806f0c0776850",
"signature_version": "v1",
"target": {
"function": "sk_setsockopt",
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-001bce59",
"signature_type": "Function"
},
{
"digest": {
"length": 8848.0,
"function_hash": "3759814391136717528004931579498822559"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b0af621c3f6ef9261cf6067812f2fd9943acb4b",
"signature_version": "v1",
"target": {
"function": "sk_setsockopt",
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-0b606fa5",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"199588446781554067150236467203980589247",
"257669158805207713676464783138707202613",
"7242149469026324944881787044470647342",
"70301289091137574162851915645214705160"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@579cfa595af1e00ccc9c3a849a4add6bba8b4bad",
"signature_version": "v1",
"target": {
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-497440b3",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"199588446781554067150236467203980589247",
"257669158805207713676464783138707202613",
"109427409018216721525215891188447523255",
"64861903111985823118126180464688737212"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b0af621c3f6ef9261cf6067812f2fd9943acb4b",
"signature_version": "v1",
"target": {
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-89a97d6d",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"199588446781554067150236467203980589247",
"257669158805207713676464783138707202613",
"7242149469026324944881787044470647342",
"70301289091137574162851915645214705160"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad2ad4cd11af9d63187cd074314b71b7cf8a2a59",
"signature_version": "v1",
"target": {
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-8cd33ea2",
"signature_type": "Line"
},
{
"digest": {
"length": 7900.0,
"function_hash": "40758147173011089872301307642575015741"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@579cfa595af1e00ccc9c3a849a4add6bba8b4bad",
"signature_version": "v1",
"target": {
"function": "sock_setsockopt",
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-8f13e6a1",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"199588446781554067150236467203980589247",
"257669158805207713676464783138707202613",
"109427409018216721525215891188447523255",
"64861903111985823118126180464688737212"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3257813a3ae7462ac5cde04e120806f0c0776850",
"signature_version": "v1",
"target": {
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-bb31f16a",
"signature_type": "Line"
},
{
"digest": {
"length": 8630.0,
"function_hash": "288862228568188333988960533985934623014"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad2ad4cd11af9d63187cd074314b71b7cf8a2a59",
"signature_version": "v1",
"target": {
"function": "sk_setsockopt",
"file": "net/core/sock.c"
},
"deprecated": false,
"id": "CVE-2024-57903-c10cd9b2",
"signature_type": "Function"
}
]