ACK: [SRU][CVE-2020-25285][BIONIC][PATCH 0/1] mm/hugetlb: fix a race between hugetlb sysctl handlers
Thadeu Lima de Souza Cascardo
cascardo at canonical.com
Tue Sep 29 16:59:41 UTC 2020
On Tue, Sep 29, 2020 at 12:52:17PM -0400, William Breathitt Gray wrote:
> On Tue, Sep 29, 2020 at 08:24:03AM -0300, Thadeu Lima de Souza Cascardo wrote:
> > On Mon, Sep 28, 2020 at 03:08:01PM -0400, William Breathitt Gray wrote:
> > > SRU Justification
> > > =================
> > >
> > > [Impact]
> > >
> > > A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the
> > > Linux kernel before 5.8.8 could be used by local attackers to corrupt
> > > memory, cause a NULL pointer dereference, or possibly have unspecified
> > > other impact, aka CID-17743798d812.
> > >
> > > [Testing]
> > >
> > > The following oops was seen:
> > >
> > > BUG: kernel NULL pointer dereference, address: 0000000000000000
> > > #PF: supervisor instruction fetch in kernel mode
> > > #PF: error_code(0x0010) - not-present page
> > > Code: Bad RIP value.
> > > ...
> > > Call Trace:
> > > ? set_max_huge_pages+0x3da/0x4f0
> > > ? alloc_pool_huge_page+0x150/0x150
> > > ? proc_doulongvec_minmax+0x46/0x60
> > > ? hugetlb_sysctl_handler_common+0x1c7/0x200
> > > ? nr_hugepages_store+0x20/0x20
> > > ? copy_fd_bitmaps+0x170/0x170
> > > ? hugetlb_sysctl_handler+0x1e/0x20
> > > ? proc_sys_call_handler+0x2f1/0x300
> > > ? unregister_sysctl_table+0xb0/0xb0
> > > ? __fd_install+0x78/0x100
> > > ? proc_sys_write+0x14/0x20
> > > ? __vfs_write+0x4d/0x90
> > > ? vfs_write+0xef/0x240
> > > ? ksys_write+0xc0/0x160
> > > ? __ia32_sys_read+0x50/0x50
> > > ? __close_fd+0x129/0x150
> > > ? __x64_sys_write+0x43/0x50
> > > ? do_syscall_64+0x6c/0x200
> > > ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
> > >
> > > Upstream discussions suggests a simple way to reproduce the error: let
> > > more than one thread write to `/proc/sys/vm/nr_hugepages` -- this should
> > > trigger the race condition and eventually result in the kernel oops.
> > >
> > > See <https://lkml.org/lkml/2020/8/24/2104> for reference.
> >
> > I can easily reproduce a crash when doing just what is told here, that is, have
> > two processes writing 0 to /proc/sys/vm/nr_hugepages. It doesn't take long to
> > have such a race condition. Reproduced it twice. When using a value other than
> > 0, it didn't crash after hours.
> >
> > Was the patch tested against such a reproducer?
> >
> > Cascardo.
>
> Just a follow-up: I was able to reproduce the race condition issue as
> well by writing 0 to /proc/sys/vm/nr_hugepages using several thread.
> Once this patch is applied to fix the bug, I am no longer able to
> reproduce.
>
> William Breathitt Gray
>
That's great! Thanks a lot for following this up.
Acked-by: Thadeu Lima de Souza Cascardo <cascardo at canonical.com>
> > >
> > > [Regression Potential]
> > >
> > > Regression potential should be low. This fix is a simple backport of the
> > > upstream patch, and it's the same that has already been merged in Focal
> > > and Xenial.
> > >
> > > [Miscellaneous]
> > >
> > > This bug fix has already been merged in Focal (commit 5f84359e290f) and
> > > Xenial (commit 9e8fee58b064).
> > >
> > > Muchun Song (1):
> > > mm/hugetlb: fix a race between hugetlb sysctl handlers
> > >
> > > mm/hugetlb.c | 26 ++++++++++++++++++++------
> > > 1 file changed, 20 insertions(+), 6 deletions(-)
> > >
> > > --
> > > 2.25.1
> > >
> > >
> > > --
> > > kernel-team mailing list
> > > kernel-team at lists.ubuntu.com
> > > https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list