Skip to content

Commit 901f916

Browse files
shjalaclaude
andcommitted
crypto: algif_aead - Revert to operating out-of-place (CVE-2026-31431)
Backport of upstream fix fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8 to 6.12.49. Mostly reverts commit 72548b0 except for the copying of the associated data. The 2017 in-place optimization in algif_aead chained tag pages from splice() by reference into the destination scatterlist, then set req->src = req->dst. Combined with authencesn's scratch writes at dst[assoclen + cryptlen], this allowed an unprivileged user to write to read-only page cache pages (e.g. /usr/bin/su) via AF_ALG sockets, enabling local privilege escalation. Fix: remove the in-place enc/dec paths entirely. Pull the full TX SGL into a per-request SGL (out-of-place), copy only the AAD to the RX buffer, and pass the TX SGL directly as the crypto source. This eliminates the sg_chain tag-page chaining that made the write primitive possible. 6.12-specific: uses existing crypto_aead_copy_sgl() for the AAD copy instead of the memcpy_sglist() added in later kernels. Fixes: 72548b0 ("crypto: algif_aead - copy AAD from src to dst") CVE: CVE-2026-31431 Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent b21691f commit 901f916

4 files changed

Lines changed: 38 additions & 134 deletions

File tree

crypto/af_alg.c

Lines changed: 10 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -635,15 +635,13 @@ static int af_alg_alloc_tsgl(struct sock *sk)
635635
/**
636636
* af_alg_count_tsgl - Count number of TX SG entries
637637
*
638-
* The counting starts from the beginning of the SGL to @bytes. If
639-
* an @offset is provided, the counting of the SG entries starts at the @offset.
638+
* The counting starts from the beginning of the SGL to @bytes.
640639
*
641640
* @sk: socket of connection to user space
642641
* @bytes: Count the number of SG entries holding given number of bytes.
643-
* @offset: Start the counting of SG entries from the given offset.
644642
* Return: Number of TX SG entries found given the constraints
645643
*/
646-
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes, size_t offset)
644+
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes)
647645
{
648646
const struct alg_sock *ask = alg_sk(sk);
649647
const struct af_alg_ctx *ctx = ask->private;
@@ -658,25 +656,11 @@ unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes, size_t offset)
658656
const struct scatterlist *sg = sgl->sg;
659657

660658
for (i = 0; i < sgl->cur; i++) {
661-
size_t bytes_count;
662-
663-
/* Skip offset */
664-
if (offset >= sg[i].length) {
665-
offset -= sg[i].length;
666-
bytes -= sg[i].length;
667-
continue;
668-
}
669-
670-
bytes_count = sg[i].length - offset;
671-
672-
offset = 0;
673659
sgl_count++;
674-
675-
/* If we have seen requested number of bytes, stop */
676-
if (bytes_count >= bytes)
660+
if (sg[i].length >= bytes)
677661
return sgl_count;
678662

679-
bytes -= bytes_count;
663+
bytes -= sg[i].length;
680664
}
681665
}
682666

@@ -688,19 +672,14 @@ EXPORT_SYMBOL_GPL(af_alg_count_tsgl);
688672
* af_alg_pull_tsgl - Release the specified buffers from TX SGL
689673
*
690674
* If @dst is non-null, reassign the pages to @dst. The caller must release
691-
* the pages. If @dst_offset is given only reassign the pages to @dst starting
692-
* at the @dst_offset (byte). The caller must ensure that @dst is large
693-
* enough (e.g. by using af_alg_count_tsgl with the same offset).
675+
* the pages.
694676
*
695677
* @sk: socket of connection to user space
696678
* @used: Number of bytes to pull from TX SGL
697679
* @dst: If non-NULL, buffer is reassigned to dst SGL instead of releasing. The
698680
* caller must release the buffers in dst.
699-
* @dst_offset: Reassign the TX SGL from given offset. All buffers before
700-
* reaching the offset is released.
701681
*/
702-
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst,
703-
size_t dst_offset)
682+
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst)
704683
{
705684
struct alg_sock *ask = alg_sk(sk);
706685
struct af_alg_ctx *ctx = ask->private;
@@ -725,18 +704,10 @@ void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst,
725704
* SG entries in dst.
726705
*/
727706
if (dst) {
728-
if (dst_offset >= plen) {
729-
/* discard page before offset */
730-
dst_offset -= plen;
731-
} else {
732-
/* reassign page to dst after offset */
733-
get_page(page);
734-
sg_set_page(dst + j, page,
735-
plen - dst_offset,
736-
sg[i].offset + dst_offset);
737-
dst_offset = 0;
738-
j++;
739-
}
707+
/* reassign page to dst after offset */
708+
get_page(page);
709+
sg_set_page(dst + j, page, plen, sg[i].offset);
710+
j++;
740711
}
741712

742713
sg[i].length -= plen;

crypto/algif_aead.c

Lines changed: 23 additions & 89 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@
2626
#include <crypto/internal/aead.h>
2727
#include <crypto/scatterwalk.h>
2828
#include <crypto/if_alg.h>
29-
#include <crypto/skcipher.h>
3029
#include <crypto/null.h>
3130
#include <linux/init.h>
3231
#include <linux/list.h>
@@ -96,9 +95,8 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
9695
struct aead_tfm *aeadc = pask->private;
9796
struct crypto_aead *tfm = aeadc->aead;
9897
struct crypto_sync_skcipher *null_tfm = aeadc->null_tfm;
99-
unsigned int i, as = crypto_aead_authsize(tfm);
98+
unsigned int as = crypto_aead_authsize(tfm);
10099
struct af_alg_async_req *areq;
101-
struct af_alg_tsgl *tsgl, *tmp;
102100
struct scatterlist *rsgl_src, *tsgl_src = NULL;
103101
int err = 0;
104102
size_t used = 0; /* [in] TX bufs to be en/decrypted */
@@ -178,23 +176,24 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
178176
outlen -= less;
179177
}
180178

179+
/*
180+
* Create a per request TX SGL for this request which tracks the
181+
* SG entries from the global TX SGL.
182+
*/
181183
processed = used + ctx->aead_assoclen;
182-
list_for_each_entry_safe(tsgl, tmp, &ctx->tsgl_list, list) {
183-
for (i = 0; i < tsgl->cur; i++) {
184-
struct scatterlist *process_sg = tsgl->sg + i;
185-
186-
if (!(process_sg->length) || !sg_page(process_sg))
187-
continue;
188-
tsgl_src = process_sg;
189-
break;
190-
}
191-
if (tsgl_src)
192-
break;
193-
}
194-
if (processed && !tsgl_src) {
195-
err = -EFAULT;
184+
areq->tsgl_entries = af_alg_count_tsgl(sk, processed);
185+
if (!areq->tsgl_entries)
186+
areq->tsgl_entries = 1;
187+
areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl),
188+
areq->tsgl_entries),
189+
GFP_KERNEL);
190+
if (!areq->tsgl) {
191+
err = -ENOMEM;
196192
goto free;
197193
}
194+
sg_init_table(areq->tsgl, areq->tsgl_entries);
195+
af_alg_pull_tsgl(sk, processed, areq->tsgl);
196+
tsgl_src = areq->tsgl;
198197

199198
/*
200199
* Copy of AAD from source to destination
@@ -203,83 +202,18 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
203202
* when user space uses an in-place cipher operation, the kernel
204203
* will copy the data as it does not see whether such in-place operation
205204
* is initiated.
206-
*
207-
* To ensure efficiency, the following implementation ensure that the
208-
* ciphers are invoked to perform a crypto operation in-place. This
209-
* is achieved by memory management specified as follows.
210205
*/
211206

212-
/* Use the RX SGL as source (and destination) for crypto op. */
207+
/* Use the RX SGL as destination; TX SGL as crypto source. */
213208
rsgl_src = areq->first_rsgl.sgl.sgt.sgl;
214209

215-
if (ctx->enc) {
216-
/*
217-
* Encryption operation - The in-place cipher operation is
218-
* achieved by the following operation:
219-
*
220-
* TX SGL: AAD || PT
221-
* | |
222-
* | copy |
223-
* v v
224-
* RX SGL: AAD || PT || Tag
225-
*/
226-
err = crypto_aead_copy_sgl(null_tfm, tsgl_src,
227-
areq->first_rsgl.sgl.sgt.sgl,
228-
processed);
229-
if (err)
230-
goto free;
231-
af_alg_pull_tsgl(sk, processed, NULL, 0);
232-
} else {
233-
/*
234-
* Decryption operation - To achieve an in-place cipher
235-
* operation, the following SGL structure is used:
236-
*
237-
* TX SGL: AAD || CT || Tag
238-
* | | ^
239-
* | copy | | Create SGL link.
240-
* v v |
241-
* RX SGL: AAD || CT ----+
242-
*/
243-
244-
/* Copy AAD || CT to RX SGL buffer for in-place operation. */
245-
err = crypto_aead_copy_sgl(null_tfm, tsgl_src,
246-
areq->first_rsgl.sgl.sgt.sgl,
247-
outlen);
248-
if (err)
249-
goto free;
250-
251-
/* Create TX SGL for tag and chain it to RX SGL. */
252-
areq->tsgl_entries = af_alg_count_tsgl(sk, processed,
253-
processed - as);
254-
if (!areq->tsgl_entries)
255-
areq->tsgl_entries = 1;
256-
areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl),
257-
areq->tsgl_entries),
258-
GFP_KERNEL);
259-
if (!areq->tsgl) {
260-
err = -ENOMEM;
261-
goto free;
262-
}
263-
sg_init_table(areq->tsgl, areq->tsgl_entries);
264-
265-
/* Release TX SGL, except for tag data and reassign tag data. */
266-
af_alg_pull_tsgl(sk, processed, areq->tsgl, processed - as);
267-
268-
/* chain the areq TX SGL holding the tag with RX SGL */
269-
if (usedpages) {
270-
/* RX SGL present */
271-
struct af_alg_sgl *sgl_prev = &areq->last_rsgl->sgl;
272-
struct scatterlist *sg = sgl_prev->sgt.sgl;
273-
274-
sg_unmark_end(sg + sgl_prev->sgt.nents - 1);
275-
sg_chain(sg, sgl_prev->sgt.nents + 1, areq->tsgl);
276-
} else
277-
/* no RX SGL present (e.g. authentication only) */
278-
rsgl_src = areq->tsgl;
279-
}
210+
err = crypto_aead_copy_sgl(null_tfm, tsgl_src, rsgl_src,
211+
ctx->aead_assoclen);
212+
if (err)
213+
goto free;
280214

281215
/* Initialize the crypto operation */
282-
aead_request_set_crypt(&areq->cra_u.aead_req, rsgl_src,
216+
aead_request_set_crypt(&areq->cra_u.aead_req, tsgl_src,
283217
areq->first_rsgl.sgl.sgt.sgl, used, ctx->iv);
284218
aead_request_set_ad(&areq->cra_u.aead_req, ctx->aead_assoclen);
285219
aead_request_set_tfm(&areq->cra_u.aead_req, tfm);
@@ -514,7 +448,7 @@ static void aead_sock_destruct(struct sock *sk)
514448
struct crypto_aead *tfm = aeadc->aead;
515449
unsigned int ivlen = crypto_aead_ivsize(tfm);
516450

517-
af_alg_pull_tsgl(sk, ctx->used, NULL, 0);
451+
af_alg_pull_tsgl(sk, ctx->used, NULL);
518452
sock_kzfree_s(sk, ctx->iv, ivlen);
519453
sock_kfree_s(sk, ctx, ctx->len);
520454
af_alg_release_parent(sk);

crypto/algif_skcipher.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg,
138138
* Create a per request TX SGL for this request which tracks the
139139
* SG entries from the global TX SGL.
140140
*/
141-
areq->tsgl_entries = af_alg_count_tsgl(sk, len, 0);
141+
areq->tsgl_entries = af_alg_count_tsgl(sk, len);
142142
if (!areq->tsgl_entries)
143143
areq->tsgl_entries = 1;
144144
areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl),
@@ -149,7 +149,7 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg,
149149
goto free;
150150
}
151151
sg_init_table(areq->tsgl, areq->tsgl_entries);
152-
af_alg_pull_tsgl(sk, len, areq->tsgl, 0);
152+
af_alg_pull_tsgl(sk, len, areq->tsgl);
153153

154154
/* Initialize the crypto operation */
155155
skcipher_request_set_tfm(&areq->cra_u.skcipher_req, tfm);
@@ -363,7 +363,7 @@ static void skcipher_sock_destruct(struct sock *sk)
363363
struct alg_sock *pask = alg_sk(psk);
364364
struct crypto_skcipher *tfm = pask->private;
365365

366-
af_alg_pull_tsgl(sk, ctx->used, NULL, 0);
366+
af_alg_pull_tsgl(sk, ctx->used, NULL);
367367
sock_kzfree_s(sk, ctx->iv, crypto_skcipher_ivsize(tfm));
368368
if (ctx->state)
369369
sock_kzfree_s(sk, ctx->state, crypto_skcipher_statesize(tfm));

include/crypto/if_alg.h

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -230,9 +230,8 @@ static inline bool af_alg_readable(struct sock *sk)
230230
return PAGE_SIZE <= af_alg_rcvbuf(sk);
231231
}
232232

233-
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes, size_t offset);
234-
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst,
235-
size_t dst_offset);
233+
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes);
234+
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst);
236235
void af_alg_wmem_wakeup(struct sock *sk);
237236
int af_alg_wait_for_data(struct sock *sk, unsigned flags, unsigned min);
238237
int af_alg_sendmsg(struct socket *sock, struct msghdr *msg, size_t size,

0 commit comments

Comments
 (0)