On Wed, Dec 5, 2018 at 8:41 PM Stanislav Fomichev <s...@google.com> wrote:
>
> We want to make sure that the following condition holds:
> 0 <= nhoff <= thoff <= skb->len
>
> BPF program can set out-of-bounds nhoff and thoff, which is dangerous, see
> recent commit d0c081b49137 ("flow_dissector: properly cap thoff field")'.
>
> Signed-off-by: Stanislav Fomichev <s...@google.com>

Acked-by: Song Liu <songliubrav...@fb.com>

> ---
>  net/core/flow_dissector.c | 5 ++++-
>  1 file changed, 4 insertions(+), 1 deletion(-)
>
> diff --git a/net/core/flow_dissector.c b/net/core/flow_dissector.c
> index ff5556d80570..af68207ee56c 100644
> --- a/net/core/flow_dissector.c
> +++ b/net/core/flow_dissector.c
> @@ -791,9 +791,12 @@ bool __skb_flow_dissect(const struct sk_buff *skb,
>                 /* Restore state */
>                 memcpy(cb, &cb_saved, sizeof(cb_saved));
>
> +               flow_keys.nhoff = clamp_t(u16, flow_keys.nhoff, 0, skb->len);
> +               flow_keys.thoff = clamp_t(u16, flow_keys.thoff,
> +                                         flow_keys.nhoff, skb->len);
> +
>                 __skb_flow_bpf_to_target(&flow_keys, flow_dissector,
>                                          target_container);
> -               key_control->thoff = min_t(u16, key_control->thoff, skb->len);
>                 rcu_read_unlock();
>                 return result == BPF_OK;
>         }
> --
> 2.20.0.rc1.387.gf8505762e3-goog
>

Reply via email to