net/sched: pedit: make sure that offset is valid
[ Upstream commit 95c2027bfeda21a28eb245121e6a249f38d0788e ] Add a validation function to make sure offset is valid: 1. Not below skb head (could happen when offset is negative). 2. Validate both 'offset' and 'at'. Signed-off-by: Amir Vadai <amir@vadai.me> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
cfa7c16d45
commit
6c42bd6a39
1 changed files with 20 additions and 4 deletions
|
@ -104,6 +104,17 @@ static void tcf_pedit_cleanup(struct tc_action *a, int bind)
|
|||
kfree(keys);
|
||||
}
|
||||
|
||||
static bool offset_valid(struct sk_buff *skb, int offset)
|
||||
{
|
||||
if (offset > 0 && offset > skb->len)
|
||||
return false;
|
||||
|
||||
if (offset < 0 && -offset > skb_headroom(skb))
|
||||
return false;
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
static int tcf_pedit(struct sk_buff *skb, const struct tc_action *a,
|
||||
struct tcf_result *res)
|
||||
{
|
||||
|
@ -130,6 +141,11 @@ static int tcf_pedit(struct sk_buff *skb, const struct tc_action *a,
|
|||
if (tkey->offmask) {
|
||||
char *d, _d;
|
||||
|
||||
if (!offset_valid(skb, off + tkey->at)) {
|
||||
pr_info("tc filter pedit 'at' offset %d out of bounds\n",
|
||||
off + tkey->at);
|
||||
goto bad;
|
||||
}
|
||||
d = skb_header_pointer(skb, off + tkey->at, 1,
|
||||
&_d);
|
||||
if (!d)
|
||||
|
@ -142,10 +158,10 @@ static int tcf_pedit(struct sk_buff *skb, const struct tc_action *a,
|
|||
" offset must be on 32 bit boundaries\n");
|
||||
goto bad;
|
||||
}
|
||||
if (offset > 0 && offset > skb->len) {
|
||||
pr_info("tc filter pedit"
|
||||
" offset %d can't exceed pkt length %d\n",
|
||||
offset, skb->len);
|
||||
|
||||
if (!offset_valid(skb, off + offset)) {
|
||||
pr_info("tc filter pedit offset %d out of bounds\n",
|
||||
offset);
|
||||
goto bad;
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue