Linux kernel -stable discussions
 help / color / mirror / Atom feed
* [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks
@ 2025-06-02 12:39 Denis Arefev
  2025-06-02 16:14 ` Sasha Levin
  2025-06-02 18:51 ` Pablo Neira Ayuso
  0 siblings, 2 replies; 3+ messages in thread
From: Denis Arefev @ 2025-06-02 12:39 UTC (permalink / raw)
  To: stable, Greg Kroah-Hartman
  Cc: Pablo Neira Ayuso, Jozsef Kadlecsik, Florian Westphal,
	David S. Miller, Jakub Kicinski, Fernando Fernandez Mancera,
	netfilter-devel, coreteam, netdev, linux-kernel, lvc-project

From: Florian Westphal <fw@strlen.de>             

commit 8b26ff7af8c32cb4148b3e147c52f9e4c695209c upstream.

We must put 'sk' reference before returning.

Fixes: 039b1f4f24ec ("netfilter: nft_socket: fix erroneous socket assignment")
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
[Denis: minor fix to resolve merge conflict.]  
Signed-off-by: Denis Arefev <arefev@swemel.ru> 
---
Backport fix for CVE-2024-46855
Link: https://nvd.nist.gov/vuln/detail/CVE-2024-46855
---
 net/netfilter/nft_socket.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/net/netfilter/nft_socket.c b/net/netfilter/nft_socket.c
index 826e5f8c78f3..07e73e50b713 100644
--- a/net/netfilter/nft_socket.c
+++ b/net/netfilter/nft_socket.c
@@ -88,13 +88,13 @@ static void nft_socket_eval(const struct nft_expr *expr,
 			*dest = sk->sk_mark;
 		} else {
 			regs->verdict.code = NFT_BREAK;
-			return;
+			goto out_put_sk;
 		}
 		break;
 	case NFT_SOCKET_WILDCARD:
 		if (!sk_fullsock(sk)) {
 			regs->verdict.code = NFT_BREAK;
-			return;
+			goto out_put_sk;
 		}
 		nft_socket_wildcard(pkt, regs, sk, dest);
 		break;
@@ -103,6 +103,7 @@ static void nft_socket_eval(const struct nft_expr *expr,
 		regs->verdict.code = NFT_BREAK;
 	}
 
+out_put_sk:
 	if (sk != skb->sk)
 		sock_gen_put(sk);
 }
-- 
2.43.0


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks
  2025-06-02 12:39 [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks Denis Arefev
@ 2025-06-02 16:14 ` Sasha Levin
  2025-06-02 18:51 ` Pablo Neira Ayuso
  1 sibling, 0 replies; 3+ messages in thread
From: Sasha Levin @ 2025-06-02 16:14 UTC (permalink / raw)
  To: stable; +Cc: Denis Arefev, Sasha Levin

[ Sasha's backport helper bot ]

Hi,

✅ All tests passed successfully. No issues detected.
No action required from the submitter.

The upstream commit SHA1 provided is correct: 8b26ff7af8c32cb4148b3e147c52f9e4c695209c

WARNING: Author mismatch between patch and upstream commit:
Backport author: Denis Arefev<arefev@swemel.ru>
Commit author: Florian Westphal<fw@strlen.de>

Status in newer kernel trees:
6.15.y | Present (exact SHA1)
6.14.y | Present (exact SHA1)
6.12.y | Present (exact SHA1)
6.6.y | Present (different SHA1: 83e6fb59040e)
6.1.y | Present (different SHA1: 33c2258bf8cb)
5.15.y | Present (different SHA1: ddc7c423c4a5)

Note: The patch differs from the upstream commit:
---
1:  8b26ff7af8c32 ! 1:  a2677efdc7b71 netfilter: nft_socket: fix sk refcount leaks
    @@ Metadata
      ## Commit message ##
         netfilter: nft_socket: fix sk refcount leaks
     
    +    commit 8b26ff7af8c32cb4148b3e147c52f9e4c695209c upstream.
    +
         We must put 'sk' reference before returning.
     
         Fixes: 039b1f4f24ec ("netfilter: nft_socket: fix erroneous socket assignment")
         Signed-off-by: Florian Westphal <fw@strlen.de>
         Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
    +    [Denis: minor fix to resolve merge conflict.]
    +    Signed-off-by: Denis Arefev <arefev@swemel.ru>
     
      ## net/netfilter/nft_socket.c ##
     @@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *expr,
    - 			*dest = READ_ONCE(sk->sk_mark);
    + 			*dest = sk->sk_mark;
      		} else {
      			regs->verdict.code = NFT_BREAK;
     -			return;
    @@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *e
      		}
      		nft_socket_wildcard(pkt, regs, sk, dest);
      		break;
    -@@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *expr,
    - 	case NFT_SOCKET_CGROUPV2:
    - 		if (!nft_sock_get_eval_cgroupv2(dest, sk, pkt, priv->level)) {
    - 			regs->verdict.code = NFT_BREAK;
    --			return;
    -+			goto out_put_sk;
    - 		}
    - 		break;
    - #endif
     @@ net/netfilter/nft_socket.c: static void nft_socket_eval(const struct nft_expr *expr,
      		regs->verdict.code = NFT_BREAK;
      	}
---

Results of testing on various branches:

| Branch                    | Patch Apply | Build Test |
|---------------------------|-------------|------------|
| stable/linux-5.10.y       |  Success    |  Success   |

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks
  2025-06-02 12:39 [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks Denis Arefev
  2025-06-02 16:14 ` Sasha Levin
@ 2025-06-02 18:51 ` Pablo Neira Ayuso
  1 sibling, 0 replies; 3+ messages in thread
From: Pablo Neira Ayuso @ 2025-06-02 18:51 UTC (permalink / raw)
  To: Denis Arefev
  Cc: stable, Greg Kroah-Hartman, Jozsef Kadlecsik, Florian Westphal,
	David S. Miller, Jakub Kicinski, Fernando Fernandez Mancera,
	netfilter-devel, coreteam, netdev, linux-kernel, lvc-project

On Mon, Jun 02, 2025 at 03:39:47PM +0300, Denis Arefev wrote:
> From: Florian Westphal <fw@strlen.de>             
> 
> commit 8b26ff7af8c32cb4148b3e147c52f9e4c695209c upstream.
> 
> We must put 'sk' reference before returning.

I have a backport for 5.4 in the queue, I will take care of this.

Thanks.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2025-06-02 18:51 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-06-02 12:39 [PATCH 5.10] netfilter: nft_socket: fix sk refcount leaks Denis Arefev
2025-06-02 16:14 ` Sasha Levin
2025-06-02 18:51 ` Pablo Neira Ayuso

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox