net/rxrpc/insecure.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)
Fix the return value of none_validate_challenge() to be explicitly true
(which indicates the source packet should simply be discarded) rather than
implicitly true (because rxrpc_abort_conn() always returns -EPROTO which
gets converted to true).
Note that this change doesn't change the behaviour of the code (which is
correct by accident) and, in any case, we *shouldn't* get a CHALLENGE
packet to an rxnull connection (ie. no security).
Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Closes: https://lists.infradead.org/pipermail/linux-afs/2025-April/009738.html
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Jakub Kicinski <kuba@kernel.org>
cc: "David S. Miller" <davem@davemloft.net>
cc: Eric Dumazet <edumazet@google.com>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
---
net/rxrpc/insecure.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/net/rxrpc/insecure.c b/net/rxrpc/insecure.c
index 1f7c136d6d0e..0a260df45d25 100644
--- a/net/rxrpc/insecure.c
+++ b/net/rxrpc/insecure.c
@@ -45,8 +45,9 @@ static void none_free_call_crypto(struct rxrpc_call *call)
static bool none_validate_challenge(struct rxrpc_connection *conn,
struct sk_buff *skb)
{
- return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
- rxrpc_eproto_rxnull_challenge);
+ rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
+ rxrpc_eproto_rxnull_challenge);
+ return true;
}
static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge,
On 5/27/25 5:01 PM, David Howells wrote: > Fix the return value of none_validate_challenge() to be explicitly true > (which indicates the source packet should simply be discarded) rather than > implicitly true (because rxrpc_abort_conn() always returns -EPROTO which > gets converted to true). > > Note that this change doesn't change the behaviour of the code (which is > correct by accident) and, in any case, we *shouldn't* get a CHALLENGE > packet to an rxnull connection (ie. no security). > > Reported-by: Dan Carpenter <dan.carpenter@linaro.org> > Closes: https://lists.infradead.org/pipermail/linux-afs/2025-April/009738.html > Signed-off-by: David Howells <dhowells@redhat.com> > cc: Marc Dionne <marc.dionne@auristor.com> > cc: Jakub Kicinski <kuba@kernel.org> > cc: "David S. Miller" <davem@davemloft.net> > cc: Eric Dumazet <edumazet@google.com> > cc: Paolo Abeni <pabeni@redhat.com> > cc: Simon Horman <horms@kernel.org> > cc: linux-afs@lists.infradead.org > cc: netdev@vger.kernel.org net-next is closed for the merge window, but this is actually a fix for code that is already in net (since Linus pulled and the trees are forwarded). We can apply it to net, no need to repost, but could you please provided a suitable Fixes tag? Thanks! Paolo
Paolo Abeni <pabeni@redhat.com> wrote:
> net-next is closed for the merge window, but this is actually a fix for
> code that is already in net (since Linus pulled and the trees are
> forwarded).
Yeah - it wasn't pulled yet when I posted it.
> We can apply it to net, no need to repost, but could you please provided
> a suitable Fixes tag?
Fixes: 5800b1cf3fd8 ("rxrpc: Allow CHALLENGEs to the passed to the app for a RESPONSE")
Thanks,
David
On Tue, May 27, 2025 at 04:01:43PM +0100, David Howells wrote: > Fix the return value of none_validate_challenge() to be explicitly true > (which indicates the source packet should simply be discarded) rather than > implicitly true (because rxrpc_abort_conn() always returns -EPROTO which > gets converted to true). > > Note that this change doesn't change the behaviour of the code (which is > correct by accident) and, in any case, we *shouldn't* get a CHALLENGE > packet to an rxnull connection (ie. no security). > > Reported-by: Dan Carpenter <dan.carpenter@linaro.org> > Closes: https://lists.infradead.org/pipermail/linux-afs/2025-April/009738.html > Signed-off-by: David Howells <dhowells@redhat.com> ... Reviewed-by: Simon Horman <horms@kernel.org>
© 2016 - 2025 Red Hat, Inc.