* [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks
@ 2025-06-02 12:39 Denis Arefev
2025-06-02 16:14 ` Sasha Levin
2025-06-02 18:51 ` Pablo Neira Ayuso
0 siblings, 2 replies; 3+ messages in thread
From: Denis Arefev @ 2025-06-02 12:39 UTC (permalink / raw)
To: stable, Greg Kroah-Hartman
Cc: Pablo Neira Ayuso, Jozsef Kadlecsik, Florian Westphal,
David S. Miller, Jakub Kicinski, Fernando Fernandez Mancera,
netfilter-devel, coreteam, netdev, linux-kernel, lvc-project
From: Florian Westphal <fw@strlen.de>
commit 8b26ff7af8c32cb4148b3e147c52f9e4c695209c upstream.
We must put 'sk' reference before returning.
Fixes: 039b1f4f24ec ("netfilter: nft_socket: fix erroneous socket assignment")
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
[Denis: minor fix to resolve merge conflict.]
Signed-off-by: Denis Arefev <arefev@swemel.ru>
---
Backport fix for CVE-2024-46855
Link: https://nvd.nist.gov/vuln/detail/CVE-2024-46855
---
net/netfilter/nft_socket.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/net/netfilter/nft_socket.c b/net/netfilter/nft_socket.c
index 826e5f8c78f3..07e73e50b713 100644
--- a/net/netfilter/nft_socket.c
+++ b/net/netfilter/nft_socket.c
@@ -88,13 +88,13 @@ static void nft_socket_eval(const struct nft_expr *expr,
*dest = sk->sk_mark;
} else {
regs->verdict.code = NFT_BREAK;
- return;
+ goto out_put_sk;
}
break;
case NFT_SOCKET_WILDCARD:
if (!sk_fullsock(sk)) {
regs->verdict.code = NFT_BREAK;
- return;
+ goto out_put_sk;
}
nft_socket_wildcard(pkt, regs, sk, dest);
break;
@@ -103,6 +103,7 @@ static void nft_socket_eval(const struct nft_expr *expr,
regs->verdict.code = NFT_BREAK;
}
+out_put_sk:
if (sk != skb->sk)
sock_gen_put(sk);
}
--
2.43.0
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks
2025-06-02 12:39 [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks Denis Arefev
@ 2025-06-02 16:14 ` Sasha Levin
2025-06-02 18:51 ` Pablo Neira Ayuso
1 sibling, 0 replies; 3+ messages in thread
From: Sasha Levin @ 2025-06-02 16:14 UTC (permalink / raw)
To: stable; +Cc: Denis Arefev, Sasha Levin
[ Sasha's backport helper bot ]
Hi,
✅ All tests passed successfully. No issues detected.
No action required from the submitter.
The upstream commit SHA1 provided is correct: 8b26ff7af8c32cb4148b3e147c52f9e4c695209c
WARNING: Author mismatch between patch and upstream commit:
Backport author: Denis Arefev<arefev@swemel.ru>
Commit author: Florian Westphal<fw@strlen.de>
Status in newer kernel trees:
6.15.y | Present (exact SHA1)
6.14.y | Present (exact SHA1)
6.12.y | Present (exact SHA1)
6.6.y | Present (different SHA1: 83e6fb59040e)
6.1.y | Present (different SHA1: 33c2258bf8cb)
5.15.y | Present (different SHA1: ddc7c423c4a5)
Note: The patch differs from the upstream commit:
---
1: 8b26ff7af8c32 ! 1: a2677efdc7b71 netfilter: nft_socket: fix sk refcount leaks
@@ Metadata
## Commit message ##
netfilter: nft_socket: fix sk refcount leaks
+ commit 8b26ff7af8c32cb4148b3e147c52f9e4c695209c upstream.
+
We must put 'sk' reference before returning.
Fixes: 039b1f4f24ec ("netfilter: nft_socket: fix erroneous socket assignment")
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
+ [Denis: minor fix to resolve merge conflict.]
+ Signed-off-by: Denis Arefev <arefev@swemel.ru>
## net/netfilter/nft_socket.c ##
@@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *expr,
- *dest = READ_ONCE(sk->sk_mark);
+ *dest = sk->sk_mark;
} else {
regs->verdict.code = NFT_BREAK;
- return;
@@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *e
}
nft_socket_wildcard(pkt, regs, sk, dest);
break;
-@@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *expr,
- case NFT_SOCKET_CGROUPV2:
- if (!nft_sock_get_eval_cgroupv2(dest, sk, pkt, priv->level)) {
- regs->verdict.code = NFT_BREAK;
-- return;
-+ goto out_put_sk;
- }
- break;
- #endif
@@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *expr,
regs->verdict.code = NFT_BREAK;
}
---
Results of testing on various branches:
| Branch | Patch Apply | Build Test |
|---------------------------|-------------|------------|
| stable/linux-5.10.y | Success | Success |
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks
2025-06-02 12:39 [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks Denis Arefev
2025-06-02 16:14 ` Sasha Levin
@ 2025-06-02 18:51 ` Pablo Neira Ayuso
1 sibling, 0 replies; 3+ messages in thread
From: Pablo Neira Ayuso @ 2025-06-02 18:51 UTC (permalink / raw)
To: Denis Arefev
Cc: stable, Greg Kroah-Hartman, Jozsef Kadlecsik, Florian Westphal,
David S. Miller, Jakub Kicinski, Fernando Fernandez Mancera,
netfilter-devel, coreteam, netdev, linux-kernel, lvc-project
On Mon, Jun 02, 2025 at 03:39:47PM +0300, Denis Arefev wrote:
> From: Florian Westphal <fw@strlen.de>
>
> commit 8b26ff7af8c32cb4148b3e147c52f9e4c695209c upstream.
>
> We must put 'sk' reference before returning.
I have a backport for 5.4 in the queue, I will take care of this.
Thanks.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2025-06-02 18:51 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-06-02 12:39 [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks Denis Arefev
2025-06-02 16:14 ` Sasha Levin
2025-06-02 18:51 ` Pablo Neira Ayuso
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox