summaryrefslogtreecommitdiffstats
path: root/src/gmputil.c
diff options
context:
space:
mode:
authorPeter Tirsek <peter@tirsek.com>2022-06-26 00:47:07 -0500
committerPablo Neira Ayuso <pablo@netfilter.org>2022-06-27 12:12:23 +0200
commit27107b4932b1bd1a39c21e0d7865f3bf220a3857 (patch)
tree86975718a442da75bf1bd58b9811df5190509e41 /src/gmputil.c
parent0f82b07f20178ea39e77a8dd90eeeebc412646e0 (diff)
evaluate: fix segfault when adding elements to invalid set
Adding elements to a set or map with an invalid definition causes nft to segfault. The following nftables.conf triggers the crash: flush ruleset create table inet filter set inet filter foo {} add element inet filter foo { foobar } Simply parsing and checking the config will trigger it: $ nft -c -f nftables.conf.crash Segmentation fault The error in the set/map definition is correctly caught and queued, but because the set is invalid and does not contain a key type, adding to it causes a NULL pointer dereference of set->key within setelem_evaluate(). I don't think it's necessary to queue another error since the underlying problem is correctly detected and reported when parsing the definition of the set. Simply checking the validity of set->key before using it seems to fix it, causing the error in the definition of the set to be reported properly. The element type error isn't caught, but that seems reasonable since the key type is invalid or unknown anyway: $ ./nft -c -f ~/nftables.conf.crash /home/pti/nftables.conf.crash:3:21-21: Error: set definition does not specify key set inet filter foo {} ^ [ Add tests to cover this case --pablo ] Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1597 Signed-off-by: Peter Tirsek <peter@tirsek.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'src/gmputil.c')
0 files changed, 0 insertions, 0 deletions