[PATCH v2] net/sctp: fix race condition in sctp_destroy_sock

2021-04-13 Thread Or Cohen
2. In inet_create or inet6_create, if there is a bpf program attached to BPF_CGROUP_INET_SOCK_CREATE which denies creation of the sctp socket. The bug is fixed by acquiring addr_wq_lock in sctp_destroy_sock instead of sctp_close. This addresses CVE-2021-23133. Reported-by: Or Cohen Reviewed-by: Xi

[PATCH] net/sctp: fix race condition in sctp_destroy_sock

2021-04-13 Thread Or Cohen
2. In inet_create or inet6_create, if there is a bpf program attached to BPF_CGROUP_INET_SOCK_CREATE which denies creation of the sctp socket. The bug is fixed by acquiring addr_wq_lock in sctp_destroy_sock instead of sctp_close. Reported-by: Or Cohen Reviewed-by: Xin Long Fixes: 610236587600 (&qu

[PATCH] net/af_unix: Remove unused old_pid variable

2020-10-11 Thread Or Cohen
Commit 109f6e39fa07c48f5801 ("af_unix: Allow SO_PEERCRED to work across namespaces.") introduced the old_pid variable in unix_listen, but it's never used. Remove the declaration and the call to put_pid. Signed-off-by: Or Cohen --- net/unix/af_unix.c | 2 -- 1 file changed, 2 del

Vulnerability report - af_packet.c - CVE-2020-14386

2020-09-03 Thread Or Cohen
d patch - 0001-net-packet-fix-overflow-in-tpacket_rcv.patch A reproducer for the bug - trigger_bug.c We are currently working on an exploit for getting root privileges from unprivileged context using this bug. If there is a problem with the patch please let me know and I will fix it. Or Cohen Palo Al