Skip to content

Commit 30a0f49

Browse files
committed
Florian Westphal says: ==================== Netfilter fixes for net 1. Silence warning about unused variable when CONFIG_NF_NAT=n, from Tom Rix. 2. nftables: Fix possible out-of-bounds access, from myself. 3. nftables: fix null deref+UAF during element insertion into rbtree, also from myself. * tag 'nf-23-05-17' of https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf: netfilter: nft_set_rbtree: fix null deref on element insertion netfilter: nf_tables: fix nft_trans type confusion netfilter: conntrack: define variables exp_nat_nla_policy and any_addr with CONFIG_NF_NAT ==================== Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Jakub Kicinski <[email protected]>
2 parents c259ad1 + 61ae320 commit 30a0f49

File tree

3 files changed

+18
-10
lines changed

3 files changed

+18
-10
lines changed

net/netfilter/nf_conntrack_netlink.c

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2976,7 +2976,9 @@ static int ctnetlink_exp_dump_mask(struct sk_buff *skb,
29762976
return -1;
29772977
}
29782978

2979+
#if IS_ENABLED(CONFIG_NF_NAT)
29792980
static const union nf_inet_addr any_addr;
2981+
#endif
29802982

29812983
static __be32 nf_expect_get_id(const struct nf_conntrack_expect *exp)
29822984
{
@@ -3460,10 +3462,12 @@ ctnetlink_change_expect(struct nf_conntrack_expect *x,
34603462
return 0;
34613463
}
34623464

3465+
#if IS_ENABLED(CONFIG_NF_NAT)
34633466
static const struct nla_policy exp_nat_nla_policy[CTA_EXPECT_NAT_MAX+1] = {
34643467
[CTA_EXPECT_NAT_DIR] = { .type = NLA_U32 },
34653468
[CTA_EXPECT_NAT_TUPLE] = { .type = NLA_NESTED },
34663469
};
3470+
#endif
34673471

34683472
static int
34693473
ctnetlink_parse_expect_nat(const struct nlattr *attr,

net/netfilter/nf_tables_api.c

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3865,12 +3865,10 @@ static struct nft_rule *nft_rule_lookup_byid(const struct net *net,
38653865
struct nft_trans *trans;
38663866

38673867
list_for_each_entry(trans, &nft_net->commit_list, list) {
3868-
struct nft_rule *rule = nft_trans_rule(trans);
3869-
38703868
if (trans->msg_type == NFT_MSG_NEWRULE &&
38713869
trans->ctx.chain == chain &&
38723870
id == nft_trans_rule_id(trans))
3873-
return rule;
3871+
return nft_trans_rule(trans);
38743872
}
38753873
return ERR_PTR(-ENOENT);
38763874
}

net/netfilter/nft_set_rbtree.c

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -221,25 +221,29 @@ static int nft_rbtree_gc_elem(const struct nft_set *__set,
221221
{
222222
struct nft_set *set = (struct nft_set *)__set;
223223
struct rb_node *prev = rb_prev(&rbe->node);
224-
struct nft_rbtree_elem *rbe_prev;
224+
struct nft_rbtree_elem *rbe_prev = NULL;
225225
struct nft_set_gc_batch *gcb;
226226

227227
gcb = nft_set_gc_batch_check(set, NULL, GFP_ATOMIC);
228228
if (!gcb)
229229
return -ENOMEM;
230230

231231
/* search for expired end interval coming before this element. */
232-
do {
232+
while (prev) {
233233
rbe_prev = rb_entry(prev, struct nft_rbtree_elem, node);
234234
if (nft_rbtree_interval_end(rbe_prev))
235235
break;
236236

237237
prev = rb_prev(prev);
238-
} while (prev != NULL);
238+
}
239+
240+
if (rbe_prev) {
241+
rb_erase(&rbe_prev->node, &priv->root);
242+
atomic_dec(&set->nelems);
243+
}
239244

240-
rb_erase(&rbe_prev->node, &priv->root);
241245
rb_erase(&rbe->node, &priv->root);
242-
atomic_sub(2, &set->nelems);
246+
atomic_dec(&set->nelems);
243247

244248
nft_set_gc_batch_add(gcb, rbe);
245249
nft_set_gc_batch_complete(gcb);
@@ -268,7 +272,7 @@ static int __nft_rbtree_insert(const struct net *net, const struct nft_set *set,
268272
struct nft_set_ext **ext)
269273
{
270274
struct nft_rbtree_elem *rbe, *rbe_le = NULL, *rbe_ge = NULL;
271-
struct rb_node *node, *parent, **p, *first = NULL;
275+
struct rb_node *node, *next, *parent, **p, *first = NULL;
272276
struct nft_rbtree *priv = nft_set_priv(set);
273277
u8 genmask = nft_genmask_next(net);
274278
int d, err;
@@ -307,7 +311,9 @@ static int __nft_rbtree_insert(const struct net *net, const struct nft_set *set,
307311
* Values stored in the tree are in reversed order, starting from
308312
* highest to lowest value.
309313
*/
310-
for (node = first; node != NULL; node = rb_next(node)) {
314+
for (node = first; node != NULL; node = next) {
315+
next = rb_next(node);
316+
311317
rbe = rb_entry(node, struct nft_rbtree_elem, node);
312318

313319
if (!nft_set_elem_active(&rbe->ext, genmask))

0 commit comments

Comments
 (0)