* [PATCH 1/1] conntrack: fix nfct_clone with certain attribute data types
@ 2012-11-27 15:37 Florian Westphal
2012-11-27 21:15 ` Pablo Neira Ayuso
0 siblings, 1 reply; 2+ messages in thread
From: Florian Westphal @ 2012-11-27 15:37 UTC (permalink / raw)
To: netfilter-devel; +Cc: Florian Westphal
some attributes are pointers to malloc'd objects. Simply copying the
pointer results in use-after free when the original or the clone is
destroyed.
Fix it by using nfct_copy instead of memcpy and add proper test case
for cloned objects:
- nfct_cmp of orig and clone should return 1 (equal)
- freeing both the original and the clone should
neither leak memory nor result in double-frees.
the testsuite changes revealed a few more problems:
- ct1->timeout == ct2->timeout returned 0, ie. same timeout
was considered "not equal" by nfct_cmp
- secctx comparision causes "Invalid address" valgrind warnings
when pointer is NULL
- NFCT_CP_OVERRIDE did not handle helper attribute and
erronously freed ct1 secctx memory.
While at it, bump qa_test data dummy to 256 (else, valgrind
complains about move-depends-on-uninitialized-memory).
Lastly, fix compilation of test_api by killing bogus ATTR_CONNLABEL.
Signed-off-by: Florian Westphal <fw@strlen.de>
---
qa/test_api.c | 10 ++++++++--
src/conntrack/api.c | 2 +-
src/conntrack/compare.c | 9 ++++-----
src/conntrack/copy.c | 3 +++
4 files changed, 16 insertions(+), 8 deletions(-)
diff --git a/qa/test_api.c b/qa/test_api.c
index e44c228..cdd128a 100644
--- a/qa/test_api.c
+++ b/qa/test_api.c
@@ -2,6 +2,7 @@
* Run this after adding a new attribute to the nf_conntrack object
*/
+#include <assert.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
@@ -35,7 +36,7 @@ int main(void)
int ret, i;
struct nf_conntrack *ct, *ct2, *tmp;
struct nf_expect *exp, *tmp_exp;
- char data[32];
+ char data[256];
const char *val;
int status;
@@ -93,7 +94,6 @@ int main(void)
case ATTR_SECCTX:
case ATTR_TIMESTAMP_START:
case ATTR_TIMESTAMP_STOP:
- case ATTR_CONNLABELS:
continue;
/* These attributes require special handling */
case ATTR_HELPER_INFO:
@@ -206,6 +206,11 @@ int main(void)
eval_sigterm(status);
}
+ ct2 = nfct_clone(ct);
+ assert(ct2);
+ assert(nfct_cmp(ct, ct2, NFCT_CMP_ALL) == 1);
+ nfct_destroy(ct2);
+
ct2 = nfct_new();
if (!ct2) {
perror("nfct_new");
@@ -271,6 +276,7 @@ int main(void)
}
nfct_destroy(ct2);
+ printf("== destroy cloned ct entry ==\n");
nfct_destroy(ct);
nfct_destroy(tmp);
nfexp_destroy(exp);
diff --git a/src/conntrack/api.c b/src/conntrack/api.c
index 000571f..0bc2091 100644
--- a/src/conntrack/api.c
+++ b/src/conntrack/api.c
@@ -147,7 +147,7 @@ struct nf_conntrack *nfct_clone(const struct nf_conntrack *ct)
if ((clone = nfct_new()) == NULL)
return NULL;
- memcpy(clone, ct, sizeof(*ct));
+ nfct_copy(clone, ct, NFCT_CP_OVERRIDE);
return clone;
}
diff --git a/src/conntrack/compare.c b/src/conntrack/compare.c
index 830195f..b18f7fc 100644
--- a/src/conntrack/compare.c
+++ b/src/conntrack/compare.c
@@ -300,8 +300,8 @@ cmp_timeout(const struct nf_conntrack *ct1,
#define __NFCT_CMP_TIMEOUT (NFCT_CMP_TIMEOUT_LE | NFCT_CMP_TIMEOUT_GT)
if (!(flags & __NFCT_CMP_TIMEOUT) &&
- ct1->timeout != ct2->timeout)
- return 0;
+ ct1->timeout == ct2->timeout)
+ return 1;
else {
if (flags & NFCT_CMP_TIMEOUT_GT &&
ct1->timeout > ct2->timeout)
@@ -312,9 +312,6 @@ cmp_timeout(const struct nf_conntrack *ct1,
else if (flags & NFCT_CMP_TIMEOUT_EQ &&
ct1->timeout == ct2->timeout)
ret = 1;
-
- if (ret == 0)
- return 0;
}
return ret;
}
@@ -364,6 +361,8 @@ cmp_secctx(const struct nf_conntrack *ct1,
const struct nf_conntrack *ct2,
unsigned int flags)
{
+ if (ct1->secctx == NULL || ct1->secctx == NULL)
+ return ct1->secctx == ct2->secctx;
return strcmp(ct1->secctx, ct2->secctx) == 0;
}
diff --git a/src/conntrack/copy.c b/src/conntrack/copy.c
index a6aa9f7..e66c952 100644
--- a/src/conntrack/copy.c
+++ b/src/conntrack/copy.c
@@ -524,5 +524,8 @@ void __copy_fast(struct nf_conntrack *ct1, const struct nf_conntrack *ct2)
{
memcpy(ct1, ct2, sizeof(*ct1));
/* special case: secctx attribute is allocated dinamically. */
+ ct1->secctx = NULL; /* don't free: ct2 uses it */
+ ct1->helper_info = NULL;
copy_attr_secctx(ct1, ct2);
+ copy_attr_help_info(ct1, ct2);
}
--
1.7.8.6
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH 1/1] conntrack: fix nfct_clone with certain attribute data types
2012-11-27 15:37 [PATCH 1/1] conntrack: fix nfct_clone with certain attribute data types Florian Westphal
@ 2012-11-27 21:15 ` Pablo Neira Ayuso
0 siblings, 0 replies; 2+ messages in thread
From: Pablo Neira Ayuso @ 2012-11-27 21:15 UTC (permalink / raw)
To: Florian Westphal; +Cc: netfilter-devel
On Tue, Nov 27, 2012 at 04:37:36PM +0100, Florian Westphal wrote:
> some attributes are pointers to malloc'd objects. Simply copying the
> pointer results in use-after free when the original or the clone is
> destroyed.
>
> Fix it by using nfct_copy instead of memcpy and add proper test case
> for cloned objects:
> - nfct_cmp of orig and clone should return 1 (equal)
> - freeing both the original and the clone should
> neither leak memory nor result in double-frees.
>
> the testsuite changes revealed a few more problems:
> - ct1->timeout == ct2->timeout returned 0, ie. same timeout
> was considered "not equal" by nfct_cmp
> - secctx comparision causes "Invalid address" valgrind warnings
> when pointer is NULL
> - NFCT_CP_OVERRIDE did not handle helper attribute and
> erronously freed ct1 secctx memory.
>
> While at it, bump qa_test data dummy to 256 (else, valgrind
> complains about move-depends-on-uninitialized-memory).
>
> Lastly, fix compilation of test_api by killing bogus ATTR_CONNLABEL.
>
> Signed-off-by: Florian Westphal <fw@strlen.de>
This is great, thanks Florian.
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2012-11-27 21:15 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-11-27 15:37 [PATCH 1/1] conntrack: fix nfct_clone with certain attribute data types Florian Westphal
2012-11-27 21:15 ` Pablo Neira Ayuso
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).