* [PATCH V3] netfilter: x_tables: Fix use-after-free in ipt_do_table.
@ 2017-07-27 2:22 Taehee Yoo
2017-07-31 18:24 ` Pablo Neira Ayuso
0 siblings, 1 reply; 2+ messages in thread
From: Taehee Yoo @ 2017-07-27 2:22 UTC (permalink / raw)
To: pablo, fw, netfilter-devel; +Cc: ap420073
If verdict is NF_STOLEN in the SYNPROXY target,
the skb is consumed.
However, ipt_do_table() always tries to get ip header from the skb.
So that, KASAN triggers the use-after-free message.
We can reproduce this message using below command.
# iptables -I INPUT -p tcp -j SYNPROXY --mss 1460
[ 193.542265] BUG: KASAN: use-after-free in ipt_do_table+0x1405/0x1c10
[ ... ]
[ 193.578603] Call Trace:
[ 193.581590] <IRQ>
[ 193.584107] dump_stack+0x68/0xa0
[ 193.588168] print_address_description+0x78/0x290
[ 193.593828] ? ipt_do_table+0x1405/0x1c10
[ 193.598690] kasan_report+0x230/0x340
[ 193.603194] __asan_report_load2_noabort+0x19/0x20
[ 193.608950] ipt_do_table+0x1405/0x1c10
[ 193.613591] ? rcu_read_lock_held+0xae/0xd0
[ 193.618631] ? ip_route_input_rcu+0x27d7/0x4270
[ 193.624348] ? ipt_do_table+0xb68/0x1c10
[ 193.629124] ? do_add_counters+0x620/0x620
[ 193.634234] ? iptable_filter_net_init+0x60/0x60
[ ... ]
After this patch, only when verdict is XT_CONTINUE,
ipt_do_table() tries to get ip header.
Also arpt_do_table() is modified because it has same bug.
Signed-off-by: Taehee Yoo <ap420073@gmail.com>
---
V3:
- Modified arpt_do_table() is added.
V2:
- Change commit log message.
V1:
- Initial Version
net/ipv4/netfilter/arp_tables.c | 10 +++++-----
net/ipv4/netfilter/ip_tables.c | 9 +++++----
2 files changed, 10 insertions(+), 9 deletions(-)
diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c
index 0bc3c3d..9e9d9af 100644
--- a/net/ipv4/netfilter/arp_tables.c
+++ b/net/ipv4/netfilter/arp_tables.c
@@ -268,14 +268,14 @@ unsigned int arpt_do_table(struct sk_buff *skb,
acpar.targinfo = t->data;
verdict = t->u.kernel.target->target(skb, &acpar);
- /* Target might have changed stuff. */
- arp = arp_hdr(skb);
-
- if (verdict == XT_CONTINUE)
+ if (verdict == XT_CONTINUE) {
+ /* Target might have changed stuff. */
+ arp = arp_hdr(skb);
e = arpt_next_entry(e);
- else
+ } else {
/* Verdict */
break;
+ }
} while (!acpar.hotdrop);
xt_write_recseq_end(addend);
local_bh_enable();
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c
index 2a55a40..622ed28 100644
--- a/net/ipv4/netfilter/ip_tables.c
+++ b/net/ipv4/netfilter/ip_tables.c
@@ -352,13 +352,14 @@ ipt_do_table(struct sk_buff *skb,
acpar.targinfo = t->data;
verdict = t->u.kernel.target->target(skb, &acpar);
- /* Target might have changed stuff. */
- ip = ip_hdr(skb);
- if (verdict == XT_CONTINUE)
+ if (verdict == XT_CONTINUE) {
+ /* Target might have changed stuff. */
+ ip = ip_hdr(skb);
e = ipt_next_entry(e);
- else
+ } else {
/* Verdict */
break;
+ }
} while (!acpar.hotdrop);
xt_write_recseq_end(addend);
--
2.9.3
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH V3] netfilter: x_tables: Fix use-after-free in ipt_do_table.
2017-07-27 2:22 [PATCH V3] netfilter: x_tables: Fix use-after-free in ipt_do_table Taehee Yoo
@ 2017-07-31 18:24 ` Pablo Neira Ayuso
0 siblings, 0 replies; 2+ messages in thread
From: Pablo Neira Ayuso @ 2017-07-31 18:24 UTC (permalink / raw)
To: Taehee Yoo; +Cc: fw, netfilter-devel
On Thu, Jul 27, 2017 at 11:22:04AM +0900, Taehee Yoo wrote:
> If verdict is NF_STOLEN in the SYNPROXY target,
> the skb is consumed.
> However, ipt_do_table() always tries to get ip header from the skb.
> So that, KASAN triggers the use-after-free message.
>
> We can reproduce this message using below command.
> # iptables -I INPUT -p tcp -j SYNPROXY --mss 1460
>
> [ 193.542265] BUG: KASAN: use-after-free in ipt_do_table+0x1405/0x1c10
> [ ... ]
> [ 193.578603] Call Trace:
> [ 193.581590] <IRQ>
> [ 193.584107] dump_stack+0x68/0xa0
> [ 193.588168] print_address_description+0x78/0x290
> [ 193.593828] ? ipt_do_table+0x1405/0x1c10
> [ 193.598690] kasan_report+0x230/0x340
> [ 193.603194] __asan_report_load2_noabort+0x19/0x20
> [ 193.608950] ipt_do_table+0x1405/0x1c10
> [ 193.613591] ? rcu_read_lock_held+0xae/0xd0
> [ 193.618631] ? ip_route_input_rcu+0x27d7/0x4270
> [ 193.624348] ? ipt_do_table+0xb68/0x1c10
> [ 193.629124] ? do_add_counters+0x620/0x620
> [ 193.634234] ? iptable_filter_net_init+0x60/0x60
> [ ... ]
>
> After this patch, only when verdict is XT_CONTINUE,
> ipt_do_table() tries to get ip header.
> Also arpt_do_table() is modified because it has same bug.
Applied, thanks.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2017-07-31 18:24 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-07-27 2:22 [PATCH V3] netfilter: x_tables: Fix use-after-free in ipt_do_table Taehee Yoo
2017-07-31 18:24 ` Pablo Neira Ayuso
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).