netfilter: x_tables: check for bogus target offset
We're currently asserting that targetoff + targetsize <= nextoff. Extend it to also check that targetoff is >= sizeof(xt_entry). Since this is generic code, add an argument pointing to the start of the match/target, we can then derive the base structure size from the delta. We also need the e->elems pointer in a followup change to validate matches. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:

committed by
Pablo Neira Ayuso

parent
7ed2abddd2
commit
ce683e5f9d
@@ -766,7 +766,8 @@ check_entry_size_and_hooks(struct ip6t_entry *e,
|
||||
if (!ip6_checkentry(&e->ipv6))
|
||||
return -EINVAL;
|
||||
|
||||
err = xt_check_entry_offsets(e, e->target_offset, e->next_offset);
|
||||
err = xt_check_entry_offsets(e, e->elems, e->target_offset,
|
||||
e->next_offset);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
@@ -1525,7 +1526,7 @@ check_compat_entry_size_and_hooks(struct compat_ip6t_entry *e,
|
||||
if (!ip6_checkentry(&e->ipv6))
|
||||
return -EINVAL;
|
||||
|
||||
ret = xt_compat_check_entry_offsets(e,
|
||||
ret = xt_compat_check_entry_offsets(e, e->elems,
|
||||
e->target_offset, e->next_offset);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
Reference in New Issue
Block a user