summaryrefslogtreecommitdiffstats
path: root/drivers/ata/ahci_mtk.c
diff options
context:
space:
mode:
authorPablo Neira Ayuso <pablo@netfilter.org>2019-03-08 00:58:53 +0100
committerPablo Neira Ayuso <pablo@netfilter.org>2019-03-08 16:41:18 +0100
commit40ba1d9b4d19796afc9b7ece872f5f3e8f5e2c13 (patch)
tree0135069f28adef774ecb6c8da6253caf180b85a5 /drivers/ata/ahci_mtk.c
parent46f7487e161b195a1bd7ddbd9c6aba9c93ec881a (diff)
downloadlinux-40ba1d9b4d19796afc9b7ece872f5f3e8f5e2c13.tar.bz2
netfilter: nf_tables: fix set double-free in abort path
The abort path can cause a double-free of an anonymous set. Added-and-to-be-aborted rule looks like this: udp dport { 137, 138 } drop The to-be-aborted transaction list looks like this: newset newsetelem newsetelem rule This gets walked in reverse order, so first pass disables the rule, the set elements, then the set. After synchronize_rcu(), we then destroy those in same order: rule, set element, set element, newset. Problem is that the anonymous set has already been bound to the rule, so the rule (lookup expression destructor) already frees the set, when then cause use-after-free when trying to delete the elements from this set, then try to free the set again when handling the newset expression. Rule releases the bound set in first place from the abort path, this causes the use-after-free on set element removal when undoing the new element transactions. To handle this, skip new element transaction if set is bound from the abort path. This is still causes the use-after-free on set element removal. To handle this, remove transaction from the list when the set is already bound. Joint work with Florian Westphal. Fixes: f6ac85858976 ("netfilter: nf_tables: unbind set in rule from commit path") Bugzilla: https://bugzilla.netfilter.org/show_bug.cgi?id=1325 Acked-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'drivers/ata/ahci_mtk.c')
0 files changed, 0 insertions, 0 deletions