netfilter: ip6t_SYNPROXY: fix NULL pointer dereference
This happens when networking namespaces are enabled. Suggested-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Phil Sutter <phil@nwl.cc> Acked-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
parent
f58e5aa7b8
commit
96fffb4f23
1 changed files with 10 additions and 8 deletions
|
@ -37,12 +37,13 @@ synproxy_build_ip(struct sk_buff *skb, const struct in6_addr *saddr,
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
synproxy_send_tcp(const struct sk_buff *skb, struct sk_buff *nskb,
|
synproxy_send_tcp(const struct synproxy_net *snet,
|
||||||
|
const struct sk_buff *skb, struct sk_buff *nskb,
|
||||||
struct nf_conntrack *nfct, enum ip_conntrack_info ctinfo,
|
struct nf_conntrack *nfct, enum ip_conntrack_info ctinfo,
|
||||||
struct ipv6hdr *niph, struct tcphdr *nth,
|
struct ipv6hdr *niph, struct tcphdr *nth,
|
||||||
unsigned int tcp_hdr_size)
|
unsigned int tcp_hdr_size)
|
||||||
{
|
{
|
||||||
struct net *net = nf_ct_net((struct nf_conn *)nfct);
|
struct net *net = nf_ct_net(snet->tmpl);
|
||||||
struct dst_entry *dst;
|
struct dst_entry *dst;
|
||||||
struct flowi6 fl6;
|
struct flowi6 fl6;
|
||||||
|
|
||||||
|
@ -83,7 +84,8 @@ free_nskb:
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
synproxy_send_client_synack(const struct sk_buff *skb, const struct tcphdr *th,
|
synproxy_send_client_synack(const struct synproxy_net *snet,
|
||||||
|
const struct sk_buff *skb, const struct tcphdr *th,
|
||||||
const struct synproxy_options *opts)
|
const struct synproxy_options *opts)
|
||||||
{
|
{
|
||||||
struct sk_buff *nskb;
|
struct sk_buff *nskb;
|
||||||
|
@ -119,7 +121,7 @@ synproxy_send_client_synack(const struct sk_buff *skb, const struct tcphdr *th,
|
||||||
|
|
||||||
synproxy_build_options(nth, opts);
|
synproxy_build_options(nth, opts);
|
||||||
|
|
||||||
synproxy_send_tcp(skb, nskb, skb->nfct, IP_CT_ESTABLISHED_REPLY,
|
synproxy_send_tcp(snet, skb, nskb, skb->nfct, IP_CT_ESTABLISHED_REPLY,
|
||||||
niph, nth, tcp_hdr_size);
|
niph, nth, tcp_hdr_size);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -163,7 +165,7 @@ synproxy_send_server_syn(const struct synproxy_net *snet,
|
||||||
|
|
||||||
synproxy_build_options(nth, opts);
|
synproxy_build_options(nth, opts);
|
||||||
|
|
||||||
synproxy_send_tcp(skb, nskb, &snet->tmpl->ct_general, IP_CT_NEW,
|
synproxy_send_tcp(snet, skb, nskb, &snet->tmpl->ct_general, IP_CT_NEW,
|
||||||
niph, nth, tcp_hdr_size);
|
niph, nth, tcp_hdr_size);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -203,7 +205,7 @@ synproxy_send_server_ack(const struct synproxy_net *snet,
|
||||||
|
|
||||||
synproxy_build_options(nth, opts);
|
synproxy_build_options(nth, opts);
|
||||||
|
|
||||||
synproxy_send_tcp(skb, nskb, NULL, 0, niph, nth, tcp_hdr_size);
|
synproxy_send_tcp(snet, skb, nskb, NULL, 0, niph, nth, tcp_hdr_size);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
|
@ -241,7 +243,7 @@ synproxy_send_client_ack(const struct synproxy_net *snet,
|
||||||
|
|
||||||
synproxy_build_options(nth, opts);
|
synproxy_build_options(nth, opts);
|
||||||
|
|
||||||
synproxy_send_tcp(skb, nskb, NULL, 0, niph, nth, tcp_hdr_size);
|
synproxy_send_tcp(snet, skb, nskb, NULL, 0, niph, nth, tcp_hdr_size);
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool
|
static bool
|
||||||
|
@ -301,7 +303,7 @@ synproxy_tg6(struct sk_buff *skb, const struct xt_action_param *par)
|
||||||
XT_SYNPROXY_OPT_SACK_PERM |
|
XT_SYNPROXY_OPT_SACK_PERM |
|
||||||
XT_SYNPROXY_OPT_ECN);
|
XT_SYNPROXY_OPT_ECN);
|
||||||
|
|
||||||
synproxy_send_client_synack(skb, th, &opts);
|
synproxy_send_client_synack(snet, skb, th, &opts);
|
||||||
return NF_DROP;
|
return NF_DROP;
|
||||||
|
|
||||||
} else if (th->ack && !(th->fin || th->rst || th->syn)) {
|
} else if (th->ack && !(th->fin || th->rst || th->syn)) {
|
||||||
|
|
Loading…
Add table
Reference in a new issue