NACK: [SRU][F][PATCH 1/1] net_sched: hfsc: Fix a UAF vulnerability in class handling
Ian Whitfield
ian.whitfield at canonical.com
Mon May 19 16:34:03 UTC 2025
On Wed, May 07, 2025 at 06:28:52PM -0700, Tim Whisonant wrote:
> From: Cong Wang <xiyou.wangcong at gmail.com>
>
> This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class
> handling. The issue occurs due to a time-of-check/time-of-use condition
> in hfsc_change_class() when working with certain child qdiscs like netem
> or codel.
>
> The vulnerability works as follows:
> 1. hfsc_change_class() checks if a class has packets (q.qlen != 0)
> 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,
> codel, netem) might drop packets and empty the queue
> 3. The code continues assuming the queue is still non-empty, adding
> the class to vttree
> 4. This breaks HFSC scheduler assumptions that only non-empty classes
> are in vttree
> 5. Later, when the class is destroyed, this can lead to a Use-After-Free
>
> The fix adds a second queue length check after qdisc_peek_len() to verify
> the queue wasn't emptied.
>
> Fixes: 21f4d5cc25ec ("net_sched/hfsc: fix curve activation in hfsc_change_class()")
> Reported-by: Gerrard Tai <gerrard.tai at starlabs.sg>
> Reviewed-by: Konstantin Khlebnikov <koct9i at gmail.com>
> Signed-off-by: Cong Wang <xiyou.wangcong at gmail.com>
> Reviewed-by: Jamal Hadi Salim <jhs at mojatatu.com>
> Link: https://patch.msgid.link/20250417184732.943057-2-xiyou.wangcong@gmail.com
> Signed-off-by: Jakub Kicinski <kuba at kernel.org>
> (cherry picked from commit 3df275ef0a6ae181e8428a6589ef5d5231e58b5c)
> CVE-2025-37797
> Signed-off-by: Tim Whisonant <tim.whisonant at canonical.com>
> ---
> net/sched/sch_hfsc.c | 9 +++++++--
> 1 file changed, 7 insertions(+), 2 deletions(-)
>
> diff --git a/net/sched/sch_hfsc.c b/net/sched/sch_hfsc.c
> index 9ebae0d07a9c6..eabc62df6f4e4 100644
> --- a/net/sched/sch_hfsc.c
> +++ b/net/sched/sch_hfsc.c
> @@ -959,6 +959,7 @@ hfsc_change_class(struct Qdisc *sch, u32 classid, u32 parentid,
>
> if (cl != NULL) {
> int old_flags;
> + int len = 0;
>
> if (parentid) {
> if (cl->cl_parent &&
> @@ -989,9 +990,13 @@ hfsc_change_class(struct Qdisc *sch, u32 classid, u32 parentid,
> if (usc != NULL)
> hfsc_change_usc(cl, usc, cur_time);
>
> + if (cl->qdisc->q.qlen != 0)
> + len = qdisc_peek_len(cl->qdisc);
> + /* Check queue length again since some qdisc implementations
> + * (e.g., netem/codel) might empty the queue during the peek
> + * operation.
> + */
> if (cl->qdisc->q.qlen != 0) {
> - int len = qdisc_peek_len(cl->qdisc);
> -
> if (cl->cl_flags & HFSC_RSC) {
> if (old_flags & HFSC_RSC)
> update_ed(cl, len);
> --
> 2.43.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
The subject of this patch needs the full [F/J/N/O/P] to be picked up by our
tooling for all kernels, and it currently only has [F].
More information about the kernel-team
mailing list