aboutsummaryrefslogtreecommitdiffstats
path: root/net/netfilter
diff options
context:
space:
mode:
authorPatrick McHardy <kaber@trash.net>2008-04-14 05:15:52 -0400
committerPatrick McHardy <kaber@trash.net>2008-04-14 05:15:52 -0400
commit5f7da4d26d421f3bdf10c3bbdb86ffc3a12a84f2 (patch)
tree67c6cbeaa4005d5410d2f9dd02b9802b6ddf8beb /net/netfilter
parentdd13b010368f85dfa59364ba87bfe8ae930b2832 (diff)
[NETFILTER]: nf_conntrack_tcp: catch invalid state updates over ctnetlink
Invalid states can cause out-of-bound memory accesses of the state table. Also don't insist on having a new state contained in the netlink message. Signed-off-by: Patrick McHardy <kaber@trash.net>
Diffstat (limited to 'net/netfilter')
-rw-r--r--net/netfilter/nf_conntrack_proto_tcp.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/net/netfilter/nf_conntrack_proto_tcp.c b/net/netfilter/nf_conntrack_proto_tcp.c
index 62567959b66..57831c75fa9 100644
--- a/net/netfilter/nf_conntrack_proto_tcp.c
+++ b/net/netfilter/nf_conntrack_proto_tcp.c
@@ -1129,11 +1129,13 @@ static int nlattr_to_tcp(struct nlattr *cda[], struct nf_conn *ct)
1129 if (err < 0) 1129 if (err < 0)
1130 return err; 1130 return err;
1131 1131
1132 if (!tb[CTA_PROTOINFO_TCP_STATE]) 1132 if (tb[CTA_PROTOINFO_TCP_STATE] &&
1133 nla_get_u8(tb[CTA_PROTOINFO_TCP_STATE]) >= TCP_CONNTRACK_MAX)
1133 return -EINVAL; 1134 return -EINVAL;
1134 1135
1135 write_lock_bh(&tcp_lock); 1136 write_lock_bh(&tcp_lock);
1136 ct->proto.tcp.state = nla_get_u8(tb[CTA_PROTOINFO_TCP_STATE]); 1137 if (tb[CTA_PROTOINFO_TCP_STATE])
1138 ct->proto.tcp.state = nla_get_u8(tb[CTA_PROTOINFO_TCP_STATE]);
1137 1139
1138 if (tb[CTA_PROTOINFO_TCP_FLAGS_ORIGINAL]) { 1140 if (tb[CTA_PROTOINFO_TCP_FLAGS_ORIGINAL]) {
1139 struct nf_ct_tcp_flags *attr = 1141 struct nf_ct_tcp_flags *attr =