Skip to content

Commit b03c921

Browse files
committed
net: gso: fix ownership in __udp_gso_segment
jira LE-3262 cve CVE-2025-21926 Rebuild_History Non-Buildable kernel-5.14.0-570.21.1.el9_6 commit-author Antoine Tenart <[email protected]> commit ee01b2f In __udp_gso_segment the skb destructor is removed before segmenting the skb but the socket reference is kept as-is. This is an issue if the original skb is later orphaned as we can hit the following bug: kernel BUG at ./include/linux/skbuff.h:3312! (skb_orphan) RIP: 0010:ip_rcv_core+0x8b2/0xca0 Call Trace: ip_rcv+0xab/0x6e0 __netif_receive_skb_one_core+0x168/0x1b0 process_backlog+0x384/0x1100 __napi_poll.constprop.0+0xa1/0x370 net_rx_action+0x925/0xe50 The above can happen following a sequence of events when using OpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an OVS_ACTION_ATTR_OUTPUT action: 1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb goes through queue_gso_packets and then __udp_gso_segment, where its destructor is removed. 2. The segments' data are copied and sent to userspace. 3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the same original skb is sent to its path. 4. If it later hits skb_orphan, we hit the bug. Fix this by also removing the reference to the socket in __udp_gso_segment. Fixes: ad40585 ("udp: better wmem accounting on gso") Signed-off-by: Antoine Tenart <[email protected]> Link: https://patch.msgid.link/[email protected] Signed-off-by: Jakub Kicinski <[email protected]> (cherry picked from commit ee01b2f) Signed-off-by: Jonathan Maple <[email protected]>
1 parent 53c06ad commit b03c921

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

net/ipv4/udp_offload.c

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -315,13 +315,17 @@ struct sk_buff *__udp_gso_segment(struct sk_buff *gso_skb,
315315

316316
/* clear destructor to avoid skb_segment assigning it to tail */
317317
copy_dtor = gso_skb->destructor == sock_wfree;
318-
if (copy_dtor)
318+
if (copy_dtor) {
319319
gso_skb->destructor = NULL;
320+
gso_skb->sk = NULL;
321+
}
320322

321323
segs = skb_segment(gso_skb, features);
322324
if (IS_ERR_OR_NULL(segs)) {
323-
if (copy_dtor)
325+
if (copy_dtor) {
324326
gso_skb->destructor = sock_wfree;
327+
gso_skb->sk = sk;
328+
}
325329
return segs;
326330
}
327331

0 commit comments

Comments
 (0)