]> git.baikalelectronics.ru Git - kernel.git/commit
netfilter: nf_queue: do not allow packet truncation below transport header offset
authorFlorian Westphal <fw@strlen.de>
Tue, 26 Jul 2022 10:42:06 +0000 (12:42 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 3 Aug 2022 10:03:53 +0000 (12:03 +0200)
commitb1d10056179d22e60eae85ea0f5f275de4c14fc4
tree81a10bb1b744d36eda65508b22cd638a159e87e2
parente52de41bcb91f7c3a09cdfa17ae50542920c6273
netfilter: nf_queue: do not allow packet truncation below transport header offset

[ Upstream commit 7f94d46ce22e6b98b09bc57db5d3f47a409c9607 ]

Domingo Dirutigliano and Nicola Guerrera report kernel panic when
sending nf_queue verdict with 1-byte nfta_payload attribute.

The IP/IPv6 stack pulls the IP(v6) header from the packet after the
input hook.

If user truncates the packet below the header size, this skb_pull() will
result in a malformed skb (skb->len < 0).

Fixes: c68374e54fde ("[NETFILTER]: Add "nfnetlink_queue" netfilter queue handler over nfnetlink")
Reported-by: Domingo Dirutigliano <pwnzer0tt1@proton.me>
Signed-off-by: Florian Westphal <fw@strlen.de>
Reviewed-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
net/netfilter/nfnetlink_queue.c