Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7370701yba; Thu, 2 May 2019 08:44:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqxj42tRvMyn9cltQL1QVdgIRbW5OrFfweiH6LKKRz7Cmvr32TRz3nd88MyAJZwOxNHjq3yj X-Received: by 2002:a62:4558:: with SMTP id s85mr5013763pfa.171.1556811870104; Thu, 02 May 2019 08:44:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556811870; cv=none; d=google.com; s=arc-20160816; b=jmpOPYPgHtZ6TpRvhACUjG9GSE5Ln4WCMdHPJ7q0TOJj9woGBCRE5hFdeQvJ0eS0bA J9h2GYys1Au4ifMcC97v3Lrs77PdfCZ+JcVUaFzHlqb0I9F1Ml2hPEVaubsN067ySewG VJBfZv7u+FRhbbCQ3flHixYJoji9c9iBWlGn4jeoHpMEQmdAW5QVaK4NsSUekqwpM4RL rBMvlLYGeRoQZu7akubt6JN7Ln8PyIDRgoOVA5XvjPjsmQWuqrLa4BF7DCFAOr9XhfCj SrlnhP0xfPhRSRDmegUGRu59nIWUfPCAGHfUv7S67+y+lQWpJsbizRo9gVxaucUN1EcS hfxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9vxpKqaqiBvhrBo8Yri3zMki7H9ixXV2pIvm6f4tDE8=; b=mQAgnYMSAdpZe90T6jXUt1t0DcuCGdmwOhn1D8HqpJX57l8JRX3Lz9Ein5ZZSdLDFq wk0CTp/MOHYAle9IIQCxPWyNKQdiibaJPqP1+BmORFJuSmcbhmWxc4QVcI9zL5uGweSY VrOT+4w7jV5zW4QZh6plqA+DYkKG9b3GhEa40Yw6hh4OW57FiYxC2qX3GZrdFa5Jl8vS 9Iz3jaMk4bcxwEd4HtKV6SGUHyeySMhqFaU7x2iTAJGz9R7OynFfqAGJ4Ha/CxQgbrfv 2xtcrlUe6a+0npnDVmU1qLW20wRGG07ziJkQC+Q9zZ+r8xzul0UgF15JBdgRiWJE4V+3 J3jw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FpeKRTcL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k10si43489815pls.327.2019.05.02.08.44.14; Thu, 02 May 2019 08:44:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FpeKRTcL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728024AbfEBP1j (ORCPT + 99 others); Thu, 2 May 2019 11:27:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:44530 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728015AbfEBP1h (ORCPT ); Thu, 2 May 2019 11:27:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BD1CB216FD; Thu, 2 May 2019 15:27:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556810857; bh=EkyQN7rAV/ZmEFPsoY8BzF4fbX5QKRdMXmRTLhBN8QA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FpeKRTcLWdRwCm0a34q8xoCDPDOkDH7iebZiYwY3nRIRLENCLKLv1Rz61iMwBrbwU D/u329WQUp8Jdq2+gHUgrgMSnbs8RdS+jfUNrXyFpLKqyCvBQMAcNKVqsypSe3I2qh NNjkbxMlzPpRcAFhhAK2VMBW+FjYswOkTwpuELT4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kangjie Lu , Pablo Neira Ayuso , "Sasha Levin (Microsoft)" Subject: [PATCH 4.19 19/72] netfilter: ip6t_srh: fix NULL pointer dereferences Date: Thu, 2 May 2019 17:20:41 +0200 Message-Id: <20190502143334.892729703@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190502143333.437607839@linuxfoundation.org> References: <20190502143333.437607839@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6d65561f3d5ec933151939c543d006b79044e7a6 ] skb_header_pointer may return NULL. The current code dereference its return values without a NULL check. The fix inserts the checks to avoid NULL pointer dereferences. Fixes: 202a8ff545cc ("netfilter: add IPv6 segment routing header 'srh' match") Signed-off-by: Kangjie Lu Signed-off-by: Pablo Neira Ayuso Signed-off-by: Sasha Levin (Microsoft) --- net/ipv6/netfilter/ip6t_srh.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/net/ipv6/netfilter/ip6t_srh.c b/net/ipv6/netfilter/ip6t_srh.c index 1059894a6f4c..4cb83fb69844 100644 --- a/net/ipv6/netfilter/ip6t_srh.c +++ b/net/ipv6/netfilter/ip6t_srh.c @@ -210,6 +210,8 @@ static bool srh1_mt6(const struct sk_buff *skb, struct xt_action_param *par) psidoff = srhoff + sizeof(struct ipv6_sr_hdr) + ((srh->segments_left + 1) * sizeof(struct in6_addr)); psid = skb_header_pointer(skb, psidoff, sizeof(_psid), &_psid); + if (!psid) + return false; if (NF_SRH_INVF(srhinfo, IP6T_SRH_INV_PSID, ipv6_masked_addr_cmp(psid, &srhinfo->psid_msk, &srhinfo->psid_addr))) @@ -223,6 +225,8 @@ static bool srh1_mt6(const struct sk_buff *skb, struct xt_action_param *par) nsidoff = srhoff + sizeof(struct ipv6_sr_hdr) + ((srh->segments_left - 1) * sizeof(struct in6_addr)); nsid = skb_header_pointer(skb, nsidoff, sizeof(_nsid), &_nsid); + if (!nsid) + return false; if (NF_SRH_INVF(srhinfo, IP6T_SRH_INV_NSID, ipv6_masked_addr_cmp(nsid, &srhinfo->nsid_msk, &srhinfo->nsid_addr))) @@ -233,6 +237,8 @@ static bool srh1_mt6(const struct sk_buff *skb, struct xt_action_param *par) if (srhinfo->mt_flags & IP6T_SRH_LSID) { lsidoff = srhoff + sizeof(struct ipv6_sr_hdr); lsid = skb_header_pointer(skb, lsidoff, sizeof(_lsid), &_lsid); + if (!lsid) + return false; if (NF_SRH_INVF(srhinfo, IP6T_SRH_INV_LSID, ipv6_masked_addr_cmp(lsid, &srhinfo->lsid_msk, &srhinfo->lsid_addr))) -- 2.19.1