From: Stanislav Fomichev Date: Tue, 12 Jan 2021 16:28:29 +0000 (-0800) Subject: bpf: Don't leak memory in bpf getsockopt when optlen == 0 X-Git-Tag: v5.4.92~24 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=79ce12cfa56a5b5a256b1c92e98a8a3a3425d131;p=thirdparty%2Fkernel%2Fstable.git bpf: Don't leak memory in bpf getsockopt when optlen == 0 commit 4be34f3d0731b38a1b24566b37fbb39500aaf3a2 upstream. optlen == 0 indicates that the kernel should ignore BPF buffer and use the original one from the user. We, however, forget to free the temporary buffer that we've allocated for BPF. Fixes: d8fe449a9c51 ("bpf: Don't return EINVAL from {get,set}sockopt when optlen > PAGE_SIZE") Reported-by: Martin KaFai Lau Signed-off-by: Stanislav Fomichev Signed-off-by: Daniel Borkmann Acked-by: Martin KaFai Lau Link: https://lore.kernel.org/bpf/20210112162829.775079-1-sdf@google.com Signed-off-by: Greg Kroah-Hartman --- diff --git a/kernel/bpf/cgroup.c b/kernel/bpf/cgroup.c index b701af27a7799..5a8b4dfdb1419 100644 --- a/kernel/bpf/cgroup.c +++ b/kernel/bpf/cgroup.c @@ -1057,12 +1057,13 @@ int __cgroup_bpf_run_filter_setsockopt(struct sock *sk, int *level, if (ctx.optlen != 0) { *optlen = ctx.optlen; *kernel_optval = ctx.optval; + /* export and don't free sockopt buf */ + return 0; } } out: - if (ret) - sockopt_free_buf(&ctx); + sockopt_free_buf(&ctx); return ret; } EXPORT_SYMBOL(__cgroup_bpf_run_filter_setsockopt);