At 2017-05-16 00:56:59, "Pablo Neira Ayuso" <[email protected]> wrote:
>On Mon, May 15, 2017 at 06:56:02PM +0200, Pablo Neira Ayuso wrote:
>> On Fri, May 12, 2017 at 05:44:10PM +0800, [email protected] wrote:
>> > From: Gao Feng <[email protected]>
>> >
>> > The info->target is from userspace and it would be used directly.
>> > So we need to add the sanity check to make sure it is a valid standard
>> > target, although the ebtables tool has already checked it. Kernel need
>> > to check anything from userspace.
>> >
>> > If the target was set as an evil value, it would break the ebtables
>> > and cause a panic. Because the non-standard target is treated as one
>> > offset.
>> >
>> > Signed-off-by: Gao Feng <[email protected]>
>> > ---
>> > net/bridge/netfilter/ebt_arpreply.c | 3 +++
>> > 1 file changed, 3 insertions(+)
>> >
>> > diff --git a/net/bridge/netfilter/ebt_arpreply.c
>> > b/net/bridge/netfilter/ebt_arpreply.c
>> > index 5929309..c4886d9 100644
>> > --- a/net/bridge/netfilter/ebt_arpreply.c
>> > +++ b/net/bridge/netfilter/ebt_arpreply.c
>> > @@ -68,6 +68,9 @@ static int ebt_arpreply_tg_check(const struct
>> > xt_tgchk_param *par)
>> > if (e->ethproto != htons(ETH_P_ARP) ||
>> > e->invflags & EBT_IPROTO)
>> > return -EINVAL;
>> > + if (INVALID_TARGET)
>>
>> Please, add:
>>
>> static inline bool ebt_invalid_target(int target)
>> {
>> return (target < -NUM_STANDARD_TARGETS || target >= 0);
>> }
>>
>> and use it in this fix.
>>
>> So we can get rid of this obscure INVALID_TARGET macro.
>
>Once this propagates to nf-next.git, you can send a follow up patch to
>use this new function from more spots, so we can kill INVALID_TARGET
>for good.
OK, no problem.
Regards
Feng
N嫥叉靣笡y氊b瞂千v豝�)藓{.n�+壏租栕玼朕�)韰骅w*jg�秹殠娸/侁鋤罐枈�2娹櫒璀�&�)摺玜囤瓽珴閔�鎗:+v墾妛鑶佶