The branch stable/13 has been updated by kp:

URL: 
https://cgit.FreeBSD.org/src/commit/?id=8f92db3cf5405e38f565591d878c7b1b409dc055

commit 8f92db3cf5405e38f565591d878c7b1b409dc055
Author:     Kristof Provost <[email protected]>
AuthorDate: 2025-10-29 08:28:59 +0000
Commit:     Kristof Provost <[email protected]>
CommitDate: 2025-11-03 08:34:27 +0000

    pf: improve DIOCRCLRTABLES validation
    
    Unterminated strings in the anchor or name could cause crashes.
    Validate them, and add a test case.
    
    Reported by:    Ilja Van Sprundel <[email protected]>
    MFC after:      3 days
    Sponsored by:   Rubicon Communications, LLC ("Netgate")
    
    (cherry picked from commit 1da3c0ca5b1decaa9cf55859cd134bdcd1218116)
---
 sys/netpfil/pf/pf_ioctl.c               | 11 +++++++++++
 tests/sys/netpfil/pf/ioctl/validation.c | 32 ++++++++++++++++++++++++++++++++
 2 files changed, 43 insertions(+)

diff --git a/sys/netpfil/pf/pf_ioctl.c b/sys/netpfil/pf/pf_ioctl.c
index 6fe84b1be489..cdb0059a5e0e 100644
--- a/sys/netpfil/pf/pf_ioctl.c
+++ b/sys/netpfil/pf/pf_ioctl.c
@@ -3849,6 +3849,17 @@ DIOCCHANGEADDR_error:
                        error = ENODEV;
                        break;
                }
+               if (strnlen(io->pfrio_table.pfrt_anchor, MAXPATHLEN)
+                   == MAXPATHLEN) {
+                       error = EINVAL;
+                       goto fail;
+               }
+               if (strnlen(io->pfrio_table.pfrt_name, PF_TABLE_NAME_SIZE)
+                   == PF_TABLE_NAME_SIZE) {
+                       error = EINVAL;
+                       goto fail;
+               }
+
                PF_RULES_WLOCK();
                error = pfr_clr_tables(&io->pfrio_table, &io->pfrio_ndel,
                    io->pfrio_flags | PFR_FLAG_USERIOCTL);
diff --git a/tests/sys/netpfil/pf/ioctl/validation.c 
b/tests/sys/netpfil/pf/ioctl/validation.c
index 152a9678812b..0adfaf59bb8b 100644
--- a/tests/sys/netpfil/pf/ioctl/validation.c
+++ b/tests/sys/netpfil/pf/ioctl/validation.c
@@ -193,6 +193,37 @@ ATF_TC_CLEANUP(gettables, tc)
        COMMON_CLEANUP();
 }
 
+ATF_TC_WITH_CLEANUP(clrtables);
+ATF_TC_HEAD(clrtables, tc)
+{
+       atf_tc_set_md_var(tc, "require.user", "root");
+}
+
+ATF_TC_BODY(clrtables, tc)
+{
+       struct pfioc_table io;
+       struct pfr_table tbl;
+       int flags;
+
+       COMMON_HEAD();
+
+       flags = 0;
+
+       memset(&io, '/', sizeof(io));
+       io.pfrio_flags = flags;
+       io.pfrio_buffer = &tbl;
+       io.pfrio_esize = 0;
+       io.pfrio_size = 1;
+
+       if (ioctl(dev, DIOCRCLRTABLES, &io) == 0)
+               atf_tc_fail("Request with unterminated anchor name succeeded");
+}
+
+ATF_TC_CLEANUP(clrtables, tc)
+{
+       COMMON_CLEANUP();
+}
+
 ATF_TC_WITH_CLEANUP(gettstats);
 ATF_TC_HEAD(gettstats, tc)
 {
@@ -923,6 +954,7 @@ ATF_TP_ADD_TCS(tp)
        ATF_TP_ADD_TC(tp, addtables);
        ATF_TP_ADD_TC(tp, deltables);
        ATF_TP_ADD_TC(tp, gettables);
+       ATF_TP_ADD_TC(tp, clrtables);
        ATF_TP_ADD_TC(tp, getastats);
        ATF_TP_ADD_TC(tp, gettstats);
        ATF_TP_ADD_TC(tp, clrtstats);

Reply via email to