diff options
author | Florian Westphal <fw@strlen.de> | 2011-08-30 09:01:20 -0400 |
---|---|---|
committer | Patrick McHardy <kaber@trash.net> | 2011-08-30 09:01:20 -0400 |
commit | c6675233f9015d3c0460c8aab53ed9b99d915c64 (patch) | |
tree | 3d1b9b71059be24fe3a35411eecc62000bba5abc /net/ipv4 | |
parent | 9823d9ff483af4ce8804a9eb69600ca739cd1f58 (diff) |
netfilter: nf_queue: reject NF_STOLEN verdicts from userspace
A userspace listener may send (bogus) NF_STOLEN verdict, which causes skb leak.
This problem was previously fixed via
64507fdbc29c3a622180378210ecea8659b14e40 (netfilter:
nf_queue: fix NF_STOLEN skb leak) but this had to be reverted because
NF_STOLEN can also be returned by a netfilter hook when iterating the
rules in nf_reinject.
Reject userspace NF_STOLEN verdict, as suggested by Michal Miroslaw.
This is complementary to commit fad54440438a7c231a6ae347738423cbabc936d9
(netfilter: avoid double free in nf_reinject).
Cc: Julian Anastasov <ja@ssi.bg>
Cc: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Patrick McHardy <kaber@trash.net>
Diffstat (limited to 'net/ipv4')
-rw-r--r-- | net/ipv4/netfilter/ip_queue.c | 11 |
1 files changed, 4 insertions, 7 deletions
diff --git a/net/ipv4/netfilter/ip_queue.c b/net/ipv4/netfilter/ip_queue.c index 48f7d5b4ff37..e59aabd0eae4 100644 --- a/net/ipv4/netfilter/ip_queue.c +++ b/net/ipv4/netfilter/ip_queue.c | |||
@@ -314,7 +314,7 @@ ipq_set_verdict(struct ipq_verdict_msg *vmsg, unsigned int len) | |||
314 | { | 314 | { |
315 | struct nf_queue_entry *entry; | 315 | struct nf_queue_entry *entry; |
316 | 316 | ||
317 | if (vmsg->value > NF_MAX_VERDICT) | 317 | if (vmsg->value > NF_MAX_VERDICT || vmsg->value == NF_STOLEN) |
318 | return -EINVAL; | 318 | return -EINVAL; |
319 | 319 | ||
320 | entry = ipq_find_dequeue_entry(vmsg->id); | 320 | entry = ipq_find_dequeue_entry(vmsg->id); |
@@ -359,12 +359,9 @@ ipq_receive_peer(struct ipq_peer_msg *pmsg, | |||
359 | break; | 359 | break; |
360 | 360 | ||
361 | case IPQM_VERDICT: | 361 | case IPQM_VERDICT: |
362 | if (pmsg->msg.verdict.value > NF_MAX_VERDICT) | 362 | status = ipq_set_verdict(&pmsg->msg.verdict, |
363 | status = -EINVAL; | 363 | len - sizeof(*pmsg)); |
364 | else | 364 | break; |
365 | status = ipq_set_verdict(&pmsg->msg.verdict, | ||
366 | len - sizeof(*pmsg)); | ||
367 | break; | ||
368 | default: | 365 | default: |
369 | status = -EINVAL; | 366 | status = -EINVAL; |
370 | } | 367 | } |