diff options
author | Daniel Gröber <dxld@darkboxed.org> | 2020-06-24 15:30:02 +0200 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2020-07-01 12:56:27 +0200 |
commit | aeabb1640ffb5643729ca2ce343738cd85b65f3f (patch) | |
tree | 9849264e74e7f459cfc953c87627337fb7855b0c /src/conntrack/setter.c | |
parent | 45d804ab63f034e3e9f525806f36eda5245aefa7 (diff) |
conntrack: Fix buffer overflow on invalid icmp type in setters
When type is out of range for the invmap_icmp{,v6} array we leave rtype at
zero which will map to type=255 just like other error cases in this
function.
Signed-off-by: Daniel Gröber <dxld@darkboxed.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'src/conntrack/setter.c')
-rw-r--r-- | src/conntrack/setter.c | 11 |
1 files changed, 7 insertions, 4 deletions
diff --git a/src/conntrack/setter.c b/src/conntrack/setter.c index 3a293b0..1d3b971 100644 --- a/src/conntrack/setter.c +++ b/src/conntrack/setter.c @@ -124,17 +124,20 @@ set_attr_repl_zone(struct nf_conntrack *ct, const void *value, size_t len) static void set_attr_icmp_type(struct nf_conntrack *ct, const void *value, size_t len) { - uint8_t rtype; + uint8_t type = *((uint8_t *) value); + uint8_t rtype = 0; - ct->head.orig.l4dst.icmp.type = *((uint8_t *) value); + ct->head.orig.l4dst.icmp.type = type; switch(ct->head.orig.l3protonum) { case AF_INET: - rtype = invmap_icmp[*((uint8_t *) value)]; + if (type < ARRAY_SIZE(invmap_icmp)) + rtype = invmap_icmp[type]; break; case AF_INET6: - rtype = invmap_icmpv6[*((uint8_t *) value) - 128]; + if (type - 128 < ARRAY_SIZE(invmap_icmpv6)) + rtype = invmap_icmpv6[type - 128]; break; default: |