Paolo Abeni <pabeni@xxxxxxxxxx> wrote: > The ipv4 nf_ct code currently skips the nf_conntrak_in() call > for fragmented packets. As a results later matches/target can end > up manipulating template ct entry instead of 'real' ones. > > Exploiting the above, syzbot found a way to trigger the following > splat: > > WARNING: CPU: 1 PID: 4242 at net/netfilter/xt_cluster.c:55 > xt_cluster_mt+0x6c1/0x840 net/netfilter/xt_cluster.c:127 > Kernel panic - not syncing: panic_on_warn set ... Right, template has l3 protocol 0. > Instead of adding checks for template ct on every target/match > manipulating skb->_nfct, simply drop the template ct when skipping > nf_conntrack_in(). Fixes: 7b4fdf77a450ec ("netfilter: don't track fragmented packets") Acked-by: Florian Westphal <fw@xxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html