]> www.infradead.org Git - users/jedix/linux-maple.git/commitdiff
netfilter: nf_tables: fix oob access
authorFlorian Westphal <fw@strlen.de>
Tue, 13 Dec 2016 12:59:33 +0000 (13:59 +0100)
committerChuck Anderson <chuck.anderson@oracle.com>
Wed, 26 Jul 2017 04:48:38 +0000 (21:48 -0700)
BUG: KASAN: slab-out-of-bounds in nf_tables_rule_destroy+0xf1/0x130 at addr ffff88006a4c35c8
Read of size 8 by task nft/1607

When we've destroyed last valid expr, nft_expr_next() returns an invalid expr.
We must not dereference it unless it passes != nft_expr_last() check.

Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
(cherry picked from commit 3e38df136e453aa69eb4472108ebce2fb00b1ba6)

Orabug: 25960439,26492640,26492632

Signed-off-by: Ethan Zhao <ethan.zhao@oracle.com>
net/netfilter/nf_tables_api.c

index 478d59aa2bdc30d87ff9301b3a3ca2d06be865f8..dbff384b8c5be38967e9ac35081435eb7407483a 100644 (file)
@@ -1922,7 +1922,7 @@ static void nf_tables_rule_destroy(const struct nft_ctx *ctx,
         * is called on error from nf_tables_newrule().
         */
        expr = nft_expr_first(rule);
-       while (expr->ops && expr != nft_expr_last(rule)) {
+       while (expr != nft_expr_last(rule) && expr->ops) {
                nf_tables_expr_destroy(ctx, expr);
                expr = nft_expr_next(expr);
        }