A userspace listener may send (bogus) NF_STOLEN verdict, which causes skb leak. This problem was previously fixed via 64507fdbc29c3a622180378210ecea8659b14e40 (netfilter: nf_queue: fix NF_STOLEN skb leak) but this had to be reverted because NF_STOLEN can also be returned by a netfilter hook when iterating the rules in nf_reinject. This is complementary to commit fad54440438a7c231a6ae347738423cbabc936d9 (netfilter: avoid double free in nf_reinject). Cc: Julian Anastasov <ja@xxxxxx> Cc: Eric Dumazet <eric.dumazet@xxxxxxxxx> Signed-off-by: Florian Westphal <fw@xxxxxxxxx> --- One alternative would be to change ip(6)queue and nfqueue to fail with -EINVAL if userspace gives NF_STOLEN verdict. Thoughts? diff --git a/net/netfilter/nf_queue.c b/net/netfilter/nf_queue.c index 5b466cd..dd2d014 100644 --- a/net/netfilter/nf_queue.c +++ b/net/netfilter/nf_queue.c @@ -267,6 +267,10 @@ void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict) const struct nf_afinfo *afinfo; int err; + /* NF_STOLEN from userspace makes no sense, we must free packet */ + if (WARN_ONCE(verdict == NF_STOLEN, "bogus verdict NF_STOLEN\n")) + verdict = NF_DROP; + rcu_read_lock(); nf_queue_entry_release_refs(entry); -- 1.7.3.4 -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html