31cc578ae2
This patch fixes the issue due to: BUG: KASAN: slab-out-of-bounds in nft_flow_rule_create+0x622/0x6a2 net/netfilter/nf_tables_offload.c:40 Read of size 8 at addr ffff888103910b58 by task syz-executor227/16244 The error happens when expr->ops is accessed early on before performing the boundary check and after nft_expr_next() moves the expr to go out-of-bounds. This patch checks the boundary condition before expr->ops that fixes the slab-out-of-bounds Read issue. Add nft_expr_more() and use it to fix this problem. Signed-off-by: Saeed Mirzamohammadi <saeed.mirzamohammadi@oracle.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> |
||
---|---|---|
.. | ||
ipv4 | ||
ipv6 | ||
br_netfilter.h | ||
nf_conntrack_acct.h | ||
nf_conntrack_bridge.h | ||
nf_conntrack_core.h | ||
nf_conntrack_count.h | ||
nf_conntrack_ecache.h | ||
nf_conntrack_expect.h | ||
nf_conntrack_extend.h | ||
nf_conntrack_helper.h | ||
nf_conntrack_l4proto.h | ||
nf_conntrack_labels.h | ||
nf_conntrack_seqadj.h | ||
nf_conntrack_synproxy.h | ||
nf_conntrack_timeout.h | ||
nf_conntrack_timestamp.h | ||
nf_conntrack_tuple.h | ||
nf_conntrack_zones.h | ||
nf_conntrack.h | ||
nf_dup_netdev.h | ||
nf_flow_table.h | ||
nf_log.h | ||
nf_nat_helper.h | ||
nf_nat_masquerade.h | ||
nf_nat_redirect.h | ||
nf_nat.h | ||
nf_queue.h | ||
nf_reject.h | ||
nf_socket.h | ||
nf_synproxy.h | ||
nf_tables_core.h | ||
nf_tables_ipv4.h | ||
nf_tables_ipv6.h | ||
nf_tables_offload.h | ||
nf_tables.h | ||
nf_tproxy.h | ||
nft_fib.h | ||
nft_meta.h | ||
nft_reject.h | ||
xt_rateest.h |