netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] netfilter: ip6t_srh: Fix potential NULL pointer dereference
@ 2019-03-11 23:19 Aditya Pakki
  2019-03-18 15:00 ` Pablo Neira Ayuso
  0 siblings, 1 reply; 2+ messages in thread
From: Aditya Pakki @ 2019-03-11 23:19 UTC (permalink / raw)
  To: pakki001
  Cc: kjlu, Pablo Neira Ayuso, Jozsef Kadlecsik, Florian Westphal,
	David S. Miller, Alexey Kuznetsov, Hideaki YOSHIFUJI,
	netfilter-devel, coreteam, netdev, linux-kernel

skb_header_pointer in srh_mt6 may return a NULL pointer that is
dereferenced in ipv6_masked_addr_cmp. This patch avoids such a scenario.

Signed-off-by: Aditya Pakki <pakki001@umn.edu>
---
 net/ipv6/netfilter/ip6t_srh.c | 11 +++++++----
 1 file changed, 7 insertions(+), 4 deletions(-)

diff --git a/net/ipv6/netfilter/ip6t_srh.c b/net/ipv6/netfilter/ip6t_srh.c
index 1059894a6f4c..5a1c0437f74b 100644
--- a/net/ipv6/netfilter/ip6t_srh.c
+++ b/net/ipv6/netfilter/ip6t_srh.c
@@ -210,9 +210,10 @@ static bool srh1_mt6(const struct sk_buff *skb, struct xt_action_param *par)
 		psidoff = srhoff + sizeof(struct ipv6_sr_hdr) +
 			  ((srh->segments_left + 1) * sizeof(struct in6_addr));
 		psid = skb_header_pointer(skb, psidoff, sizeof(_psid), &_psid);
-		if (NF_SRH_INVF(srhinfo, IP6T_SRH_INV_PSID,
+		if (psid &&
+		    NF_SRH_INVF(srhinfo, IP6T_SRH_INV_PSID,
 				ipv6_masked_addr_cmp(psid, &srhinfo->psid_msk,
-						     &srhinfo->psid_addr)))
+							&srhinfo->psid_addr)))
 			return false;
 	}
 
@@ -223,7 +224,8 @@ static bool srh1_mt6(const struct sk_buff *skb, struct xt_action_param *par)
 		nsidoff = srhoff + sizeof(struct ipv6_sr_hdr) +
 			  ((srh->segments_left - 1) * sizeof(struct in6_addr));
 		nsid = skb_header_pointer(skb, nsidoff, sizeof(_nsid), &_nsid);
-		if (NF_SRH_INVF(srhinfo, IP6T_SRH_INV_NSID,
+		if (nsid &&
+		    NF_SRH_INVF(srhinfo, IP6T_SRH_INV_NSID,
 				ipv6_masked_addr_cmp(nsid, &srhinfo->nsid_msk,
 						     &srhinfo->nsid_addr)))
 			return false;
@@ -233,7 +235,8 @@ static bool srh1_mt6(const struct sk_buff *skb, struct xt_action_param *par)
 	if (srhinfo->mt_flags & IP6T_SRH_LSID) {
 		lsidoff = srhoff + sizeof(struct ipv6_sr_hdr);
 		lsid = skb_header_pointer(skb, lsidoff, sizeof(_lsid), &_lsid);
-		if (NF_SRH_INVF(srhinfo, IP6T_SRH_INV_LSID,
+		if (lsid &&
+		    NF_SRH_INVF(srhinfo, IP6T_SRH_INV_LSID,
 				ipv6_masked_addr_cmp(lsid, &srhinfo->lsid_msk,
 						     &srhinfo->lsid_addr)))
 			return false;
-- 
2.17.1


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH] netfilter: ip6t_srh: Fix potential NULL pointer dereference
  2019-03-11 23:19 [PATCH] netfilter: ip6t_srh: Fix potential NULL pointer dereference Aditya Pakki
@ 2019-03-18 15:00 ` Pablo Neira Ayuso
  0 siblings, 0 replies; 2+ messages in thread
From: Pablo Neira Ayuso @ 2019-03-18 15:00 UTC (permalink / raw)
  To: Aditya Pakki
  Cc: kjlu, Jozsef Kadlecsik, Florian Westphal, David S. Miller,
	Alexey Kuznetsov, Hideaki YOSHIFUJI, netfilter-devel, coreteam,
	netdev, linux-kernel

On Mon, Mar 11, 2019 at 06:19:20PM -0500, Aditya Pakki wrote:
> skb_header_pointer in srh_mt6 may return a NULL pointer that is
> dereferenced in ipv6_masked_addr_cmp. This patch avoids such a scenario.

I'll take this one instead:

https://patchwork.ozlabs.org/patch/1056390/

Thanks for submitting a patch anyway.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2019-03-18 15:01 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-03-11 23:19 [PATCH] netfilter: ip6t_srh: Fix potential NULL pointer dereference Aditya Pakki
2019-03-18 15:00 ` Pablo Neira Ayuso

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).