Re: Double free vulnerability in do_rename_gpt_parts
Hey Tom,
The patch looks good to me, I do agree with simon that you'd have to initialize
the pointers to 0, because uninitialized pointers could contain garbage, unless
it's a global variable (those are automagically initialized to 0).
Btw I really appreciate the fast and friendly responses, I've seen that
different at other software packages thumbs-up for that!
Best Regards,
Jordy
> On January 17, 2020 11:31 AM Tom Rini wrote:
>
>
> On Fri, Jan 17, 2020 at 04:29:52PM +0100, Simon Goldschmidt wrote:
> > + Some contributors of this file
> >
> > On Fri, Jan 17, 2020 at 1:03 PM Jordy wrote:
> > >
> > > Hello U-Boot lists!
> > >
> > > I think I found a double free bug in U-Boot, in /cmp/gpt.c in the
> > > function do_rename_gpt_parts().
> > >
> > > On line 702 the partition_list is being free'd if ret is smaller than 0.
> > > If the return value is not -ENOMEM it will go to the out: label and free
> > > the partition_list again.
> >
> > Reading the code, I can confirm that. Funny enough, the code in question was
> > introduced by commit 18030d04 ("GPT: fix memory leaks identified by
> > Coverity").
> > Although I think Coverity should have detected the resulting double-free...
> >
> > However, I'm not sure of the fix: the code just continues for -ENOMEM and
> > then
> > goes on using partitions_list at line 757...
>
> So, Coverity later did complain about that change (but not immediately,
> funny enough). I posted http://patchwork.ozlabs.org/patch/1192036/ and
> was hoping for a review on it as it's complex enough I'd like to avoid
> adding a 3rd round of issues there. Thanks!
>
> --
> Tom
Re: Double free vulnerability in do_rename_gpt_parts
Am 17.01.2020 um 17:31 schrieb Tom Rini:
On Fri, Jan 17, 2020 at 04:29:52PM +0100, Simon Goldschmidt wrote:
+ Some contributors of this file
On Fri, Jan 17, 2020 at 1:03 PM Jordy wrote:
Hello U-Boot lists!
I think I found a double free bug in U-Boot, in /cmp/gpt.c in the function
do_rename_gpt_parts().
On line 702 the partition_list is being free'd if ret is smaller than 0.
If the return value is not -ENOMEM it will go to the out: label and free the
partition_list again.
Reading the code, I can confirm that. Funny enough, the code in question was
introduced by commit 18030d04 ("GPT: fix memory leaks identified by Coverity").
Although I think Coverity should have detected the resulting double-free...
However, I'm not sure of the fix: the code just continues for -ENOMEM and then
goes on using partitions_list at line 757...
So, Coverity later did complain about that change (but not immediately,
funny enough). I posted http://patchwork.ozlabs.org/patch/1192036/ and
was hoping for a review on it as it's complex enough I'd like to avoid
adding a 3rd round of issues there. Thanks!
Ah, yes. I've just responded there.
Regards,
Simon
Re: Double free vulnerability in do_rename_gpt_parts
On Fri, Jan 17, 2020 at 04:29:52PM +0100, Simon Goldschmidt wrote:
> + Some contributors of this file
>
> On Fri, Jan 17, 2020 at 1:03 PM Jordy wrote:
> >
> > Hello U-Boot lists!
> >
> > I think I found a double free bug in U-Boot, in /cmp/gpt.c in the function
> > do_rename_gpt_parts().
> >
> > On line 702 the partition_list is being free'd if ret is smaller than 0.
> > If the return value is not -ENOMEM it will go to the out: label and free
> > the partition_list again.
>
> Reading the code, I can confirm that. Funny enough, the code in question was
> introduced by commit 18030d04 ("GPT: fix memory leaks identified by
> Coverity").
> Although I think Coverity should have detected the resulting double-free...
>
> However, I'm not sure of the fix: the code just continues for -ENOMEM and then
> goes on using partitions_list at line 757...
So, Coverity later did complain about that change (but not immediately,
funny enough). I posted http://patchwork.ozlabs.org/patch/1192036/ and
was hoping for a review on it as it's complex enough I'd like to avoid
adding a 3rd round of issues there. Thanks!
--
Tom
signature.asc
Description: PGP signature
Re: Double free vulnerability in do_rename_gpt_parts
+ Some contributors of this file
On Fri, Jan 17, 2020 at 1:03 PM Jordy wrote:
>
> Hello U-Boot lists!
>
> I think I found a double free bug in U-Boot, in /cmp/gpt.c in the function
> do_rename_gpt_parts().
>
> On line 702 the partition_list is being free'd if ret is smaller than 0.
> If the return value is not -ENOMEM it will go to the out: label and free the
> partition_list again.
Reading the code, I can confirm that. Funny enough, the code in question was
introduced by commit 18030d04 ("GPT: fix memory leaks identified by Coverity").
Although I think Coverity should have detected the resulting double-free...
However, I'm not sure of the fix: the code just continues for -ENOMEM and then
goes on using partitions_list at line 757...
Regards,
Simon
>
> Double freeing may result in a write-what-where condition, allowing an
> attacker to execute arbitrary code.
>
> My advice would be to not free the parition_list on line 702 as nothing is
> being done with it there afterwards anyway and leave your clean_up in the
> out: label :)
>
> Kind Regards,
>
> Jordy Zomer

