Rule that fails to be added while holding a bound set triggers
user-after-free from the abort path.

Signed-off-by: Pablo Neira Ayuso <pa...@netfilter.org>
---
 tests/shell/testcases/transactions/0050rule_1 | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100755 tests/shell/testcases/transactions/0050rule_1

diff --git a/tests/shell/testcases/transactions/0050rule_1 
b/tests/shell/testcases/transactions/0050rule_1
new file mode 100755
index 000000000000..7c487e2e4710
--- /dev/null
+++ b/tests/shell/testcases/transactions/0050rule_1
@@ -0,0 +1,17 @@
+#!/bin/bash
+
+RULESET="table inet filter {
+       flowtable ft {
+               hook ingress priority 0; devices = { x, y, z };
+       }
+
+chain forward {
+       type filter hook forward priority 0; policy drop;
+
+       ip protocol { tcp, udp } counter flow add @ft
+       ip6 nexthdr { tcp, udp } counter flow add @ft
+       counter
+       }
+}"
+
+$NFT -f - <<< "$RULESET" >/dev/null
-- 
2.11.0

Reply via email to