Ack: Re: [CVE-2012-1090] natty, natty/ti-omap4

Herton Ronaldo Krzesinski herton.krzesinski at canonical.com
Fri Apr 20 13:26:53 UTC 2012


On Fri, Apr 20, 2012 at 10:38:23AM +0200, Stefan Bader wrote:
> A flaw was discovered in the Linux kernel's cifs file system. An
> unprivileged local user could exploit this flaw to crash the system leading
> to a denial of service.
> 
> I believe this was introduced somewhere in 2.6.30, so Hardy is not
> affected. Fixes have reached Oneiric and Precise via upstream stable.
> So proposing for Natty and the ti-omap4 branch there.
> 
> -Stefan
> 
> From 35e7104ae389ba5f952163f4c8c678e78269dbd9 Mon Sep 17 00:00:00 2001
> From: Jeff Layton <jlayton at redhat.com>
> Date: Thu, 23 Feb 2012 09:37:45 -0500
> Subject: [PATCH] cifs: fix dentry refcount leak when opening a FIFO on lookup
> 
> The cifs code will attempt to open files on lookup under certain
> circumstances. What happens though if we find that the file we opened
> was actually a FIFO or other special file?
> 
> Currently, the open filehandle just ends up being leaked leading to
> a dentry refcount mismatch and oops on umount. Fix this by having the
> code close the filehandle on the server if it turns out not to be a
> regular file. While we're at it, change this spaghetti if statement
> into a switch too.
> 
> Cc: stable at vger.kernel.org
> Reported-by: CAI Qian <caiqian at redhat.com>
> Tested-by: CAI Qian <caiqian at redhat.com>
> Reviewed-by: Shirish Pargaonkar <shirishpargaonkar at gmail.com>
> Signed-off-by: Jeff Layton <jlayton at redhat.com>
> Signed-off-by: Steve French <smfrench at gmail.com>
> 
> BugLink: http://bugs.launchpad.net/bugs/947997
> CVE-2012-1090
> 
> (cherry-picked from 5bccda0ebc7c0331b81ac47d39e4b920b198b2cd upstream)
> Signed-off-by: Stefan Bader <stefan.bader at canonical.com>
> ---
>  fs/cifs/dir.c |   20 ++++++++++++++++++--
>  1 file changed, 18 insertions(+), 2 deletions(-)
> 
> diff --git a/fs/cifs/dir.c b/fs/cifs/dir.c
> index dd5f229..625c53d 100644
> --- a/fs/cifs/dir.c
> +++ b/fs/cifs/dir.c
> @@ -573,10 +573,26 @@ cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry,
>  			 * If either that or op not supported returned, follow
>  			 * the normal lookup.
>  			 */
> -			if ((rc == 0) || (rc == -ENOENT))
> +			switch (rc) {
> +			case 0:
> +				/*
> +				 * The server may allow us to open things like
> +				 * FIFOs, but the client isn't set up to deal
> +				 * with that. If it's not a regular file, just
> +				 * close it and proceed as if it were a normal
> +				 * lookup.
> +				 */
> +				if (newInode && !S_ISREG(newInode->i_mode)) {
> +					CIFSSMBClose(xid, pTcon, fileHandle);
> +					break;
> +				}
> +			case -ENOENT:
>  				posix_open = true;
> -			else if ((rc == -EINVAL) || (rc != -EOPNOTSUPP))
> +			case -EOPNOTSUPP:
> +				break;
> +			default:
>  				pTcon->broken_posix_open = true;
> +			}
>  		}
>  		if (!posix_open)
>  			rc = cifs_get_inode_info_unix(&newInode, full_path,
> -- 
> 1.7.9.5
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
> 

-- 
[]'s
Herton




More information about the kernel-team mailing list