From: David Laight <David.Laight@ACULAB.COM>
To: "'joao@overdrivepizza.com'" <joao@overdrivepizza.com>,
"pablo@netfilter.org" <pablo@netfilter.org>,
"netfilter-devel@vger.kernel.org"
<netfilter-devel@vger.kernel.org>,
"coreteam@netfilter.org" <coreteam@netfilter.org>,
"netdev@vger.kernel.org" <netdev@vger.kernel.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>
Cc: "kadlec@netfilter.org" <kadlec@netfilter.org>,
"fw@strlen.de" <fw@strlen.de>,
"davem@davemloft.net" <davem@davemloft.net>,
"edumazet@google.com" <edumazet@google.com>,
"kuba@kernel.org" <kuba@kernel.org>,
"pabeni@redhat.com" <pabeni@redhat.com>,
"rkannoth@marvell.com" <rkannoth@marvell.com>,
"wojciech.drewek@intel.com" <wojciech.drewek@intel.com>,
"steen.hegenlund@microhip.com" <steen.hegenlund@microhip.com>,
"keescook@chromium.org" <keescook@chromium.org>,
Joao Moreira <joao.moreira@intel.com>
Subject: RE: [PATCH v2 2/2] Make num_actions unsigned
Date: Fri, 29 Sep 2023 08:10:00 +0000 [thread overview]
Message-ID: <09695e42dfaf4dfe9457aa814fef297e@AcuMS.aculab.com> (raw)
In-Reply-To: <20230927020221.85292-3-joao@overdrivepizza.com>
From: joao@overdrivepizza.com
> Sent: 27 September 2023 03:02
>
> From: Joao Moreira <joao.moreira@intel.com>
>
> Currently, in nft_flow_rule_create function, num_actions is a signed
> integer. Yet, it is processed within a loop which increments its
> value. To prevent an overflow from occurring, make it unsigned and
> also check if it reaches UINT_MAX when being incremented.
>
> After checking with maintainers, it was mentioned that front-end will
> cap the num_actions value and that it is not possible to reach such
> condition for an overflow. Yet, for correctness, it is still better to
> fix this.
>
> This issue was observed by the commit author while reviewing a write-up
> regarding a CVE within the same subsystem [1].
>
> 1 - https://nickgregory.me/post/2022/03/12/cve-2022-25636/
>
> Signed-off-by: Joao Moreira <joao.moreira@intel.com>
> ---
> net/netfilter/nf_tables_offload.c | 6 +++++-
> 1 file changed, 5 insertions(+), 1 deletion(-)
>
> diff --git a/net/netfilter/nf_tables_offload.c b/net/netfilter/nf_tables_offload.c
> index 12ab78fa5d84..d25088791a74 100644
> --- a/net/netfilter/nf_tables_offload.c
> +++ b/net/netfilter/nf_tables_offload.c
> @@ -90,7 +90,8 @@ struct nft_flow_rule *nft_flow_rule_create(struct net *net,
> {
> struct nft_offload_ctx *ctx;
> struct nft_flow_rule *flow;
> - int num_actions = 0, err;
> + unsigned int num_actions = 0;
> + int err;
> struct nft_expr *expr;
>
> expr = nft_expr_first(rule);
> @@ -99,6 +100,9 @@ struct nft_flow_rule *nft_flow_rule_create(struct net *net,
> expr->ops->offload_action(expr))
> num_actions++;
>
> + if (num_actions == UINT_MAX)
> + return ERR_PTR(-ENOMEM);
> +
> expr = nft_expr_next(expr);
The code is going to 'crash and burn' well before the counter
can possibly overflow.
nft_expr_next() is ((void *)expr) + expr->ops->size;
It is far more likely that has got setup wrong than the
count is too big.
David
-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
Registration No: 1397386 (Wales)
next prev parent reply other threads:[~2023-09-29 8:10 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-09-27 2:02 [PATCH v2 0/2] Prevent potential write out of bounds joao
2023-09-27 2:02 ` [PATCH v2 1/2] Make loop indexes unsigned joao
2023-09-27 2:02 ` [PATCH v2 2/2] Make num_actions unsigned joao
2023-09-29 8:10 ` David Laight [this message]
2023-09-27 8:24 ` [PATCH v2 0/2] Prevent potential write out of bounds Pablo Neira Ayuso
2023-09-27 8:35 ` Pablo Neira Ayuso
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=09695e42dfaf4dfe9457aa814fef297e@AcuMS.aculab.com \
--to=david.laight@aculab.com \
--cc=coreteam@netfilter.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=fw@strlen.de \
--cc=joao.moreira@intel.com \
--cc=joao@overdrivepizza.com \
--cc=kadlec@netfilter.org \
--cc=keescook@chromium.org \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=pablo@netfilter.org \
--cc=rkannoth@marvell.com \
--cc=steen.hegenlund@microhip.com \
--cc=wojciech.drewek@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).