Re: [PATCH] atm: lec: fix use-after-free in sock_def_readable()
From: Jiayuan Chen
Date: Mon Mar 09 2026 - 05:58:05 EST
On Mon, Mar 09, 2026 at 03:06:14PM +0800, Deepanshu Kartikey wrote:
> A race condition exists between lec_atm_close() setting priv->lecd = NULL
> and concurrent access to priv->lecd in send_to_lecd(), lec_handle_bridge(),
> and lec_atm_send(). When the socket is freed via RCU while another thread
> is still using it, a use-after-free occurs in sock_def_readable() when
> accessing the socket's wait queue.
>
> The root cause is that lec_atm_close() clears priv->lecd without holding
> lec_arp_lock, while callers dereference priv->lecd without any protection
> against concurrent teardown.
>
> Fix this by:
> - Protecting priv->lecd = NULL in lec_atm_close() with lec_arp_lock to
> synchronize with callers that already hold the lock (e.g. lec_arp_resolve)
> - Using sock_hold/sock_put in send_to_lecd() to pin the socket while in
> use. This is safe because send_to_lecd() is called under lec_arp_lock
> by lec_arp_resolve(), preventing concurrent NULL assignment of lecd.
> - Using lec_arp_lock + sock_hold/sock_put in lec_handle_bridge() and
> lec_atm_send() where the lock is not held by the caller, with proper
> skb cleanup on early exit to avoid memory leaks.
This is wrong. send_to_lecd() is also called from lec_arp_expire_arp() without lec_arp_lock.
lec_arp_expire_arp() // no lec_arp_lock held
→ send_to_lecd()
→ sk = sk_atm(priv->lecd) // UAF: lecd already freed
→ sock_hold(sk) // too late
The sock_hold() is placed after the dereference of priv->lecd,
so it cannot prevent the UAF — the dangling pointer has already been followed.
> Note: Patch testing via syzbot was attempted but the test VM crashed
> due to a QEMU AHCI emulation assertion failure (hw/ide/core.c:934)
> unrelated to this fix. The QEMU crash is caused by syzbot's disk I/O
> fuzzing triggering a known QEMU NCQ emulation bug, not by this patch.
> Compile testing with "make W=1 net/atm/lec.o" passes cleanly.
>
> Reported-by: syzbot+f50072212ab792c86925@xxxxxxxxxxxxxxxxxxxxxxxxx
> Closes: https://syzkaller.appspot.com/bug?extid=f50072212ab792c86925
> Signed-off-by: Deepanshu Kartikey <kartikey406@xxxxxxxxx>
> ---
> net/atm/lec.c | 31 +++++++++++++++++++++++++++----
> 1 file changed, 27 insertions(+), 4 deletions(-)
>
> diff --git a/net/atm/lec.c b/net/atm/lec.c
> index fb93c6e1c329..7e051174a92b 100644
> --- a/net/atm/lec.c
> +++ b/net/atm/lec.c
> @@ -131,6 +131,7 @@ static void lec_handle_bridge(struct sk_buff *skb, struct net_device *dev)
> {
> char *buff;
> struct lec_priv *priv;
> + unsigned long flags;
>
> /*
> * Check if this is a BPDU. If so, ask zeppelin to send
> @@ -154,10 +155,19 @@ static void lec_handle_bridge(struct sk_buff *skb, struct net_device *dev)
> /* 0x01 is topology change */
>
> priv = netdev_priv(dev);
> - atm_force_charge(priv->lecd, skb2->truesize);
> + spin_lock_irqsave(&priv->lec_arp_lock, flags);
> + if (!priv->lecd) {
> + spin_unlock_irqrestore(&priv->lec_arp_lock, flags);
> + kfree_skb(skb2);
> + return;
> + }
> sk = sk_atm(priv->lecd);
> + sock_hold(sk);
> + spin_unlock_irqrestore(&priv->lec_arp_lock, flags);
> + atm_force_charge(priv->lecd, skb2->truesize);
After the unlock, lec_atm_close() can set priv->lecd = NULL