Le 17/05/2026 à 13:00, Andrii Kuchmenko a écrit :
[Vous ne recevez pas souvent de courriers de [email protected]. 
Découvrez pourquoi ceci est important à 
https://aka.ms/LearnAboutSenderIdentification ]

module_extend_max_pages() calls kvrealloc() internally and returns
-ENOMEM on allocation failure. The return value is never checked.
The decompression loop then continues calling module_get_next_page(),
which writes struct page pointers into info->pages[]. When used_pages
reaches the stale max_pages value (not updated due to the failed
extend), a subsequent write to info->pages[used_pages++] goes out of
bounds into adjacent heap memory.

Adjacent slab objects in the same kmalloc cache (pipe_buffer,
seq_operations, cred) can be corrupted, potentially leading to local
privilege escalation on kernels without SLAB_VIRTUAL mitigation.

The call order in finit_module() is:

   module_decompress()    <- vulnerable, runs FIRST
   load_module()
     module_sig_check()   <- signature check, runs SECOND

Decompression happens before signature verification. A crafted
compressed module submitted via finit_module(MODULE_INIT_COMPRESSED_FILE)
reaches this code path before any signature gate is applied. On kernels
with module.sig_enforce=0 (default without SecureBoot) or with
unprivileged user namespaces (Ubuntu, Debian default), this is
reachable without CAP_SYS_MODULE.

Confirmed present in mainline (tested on v6.14-rc3).

Fix: add the missing error check after module_extend_max_pages() and
return immediately on failure. This matches the pattern used by every
other kvrealloc() caller in the module loading path.

Fixes: 169a58ad824d ("module: add in-kernel support for decompressing")
Cc: Dmitry Torokhov <[email protected]>
Cc: Luis Chamberlain <[email protected]>
Cc: [email protected]
Signed-off-by: Andrii Kuchmenko <[email protected]>
---
  kernel/module/decompress.c | 5 ++++-
  1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/kernel/module/decompress.c b/kernel/module/decompress.c
index a1b2c3d4e5f6..b7c8d9e0f1a2 100644
--- a/kernel/module/decompress.c
+++ b/kernel/module/decompress.c
@@ -XXX,10 +XXX,13 @@ int module_decompress(struct load_info *info,
                                 const void *buf, size_t size)
  {
         unsigned int n_pages;
-       int error;
+       int error = 0;

Please don't do that, this is unnecessary. 'error' is being set inconditionaly two lines below and unused before that.

         ssize_t data_size;

         n_pages = DIV_ROUND_UP(size, PAGE_SIZE) * 2;
+

Don't add unrelated blank lines.

         error = module_extend_max_pages(info, n_pages);
+       if (error)
+               return error;
+
         data_size = MODULE_DECOMPRESS_FN(info, buf, size);
         if (data_size < 0) {
                 error = data_size;
--
2.39.0


On which tree/branch does your patch applies ?

Reply via email to