diff options
author | Florian Westphal <fw@strlen.de> | 2022-09-20 14:20:17 +0200 |
---|---|---|
committer | Florian Westphal <fw@strlen.de> | 2022-09-20 23:50:03 +0200 |
commit | 62ce44c4fff947eebdf10bb582267e686e6835c9 (patch) | |
tree | d5ab41fc28c5f86b0fae4a7f1025c0c2546ef185 /net/bridge | |
parent | netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain() (diff) | |
download | linux-62ce44c4fff947eebdf10bb582267e686e6835c9.tar.xz linux-62ce44c4fff947eebdf10bb582267e686e6835c9.zip |
netfilter: ebtables: fix memory leak when blob is malformed
The bug fix was incomplete, it "replaced" crash with a memory leak.
The old code had an assignment to "ret" embedded into the conditional,
restore this.
Fixes: 7997eff82828 ("netfilter: ebtables: reject blobs that don't provide all entry points")
Reported-and-tested-by: syzbot+a24c5252f3e3ab733464@syzkaller.appspotmail.com
Signed-off-by: Florian Westphal <fw@strlen.de>
Diffstat (limited to 'net/bridge')
-rw-r--r-- | net/bridge/netfilter/ebtables.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/net/bridge/netfilter/ebtables.c b/net/bridge/netfilter/ebtables.c index 9a0ae59cdc50..4f385d52a1c4 100644 --- a/net/bridge/netfilter/ebtables.c +++ b/net/bridge/netfilter/ebtables.c @@ -1040,8 +1040,10 @@ static int do_replace_finish(struct net *net, struct ebt_replace *repl, goto free_iterate; } - if (repl->valid_hooks != t->valid_hooks) + if (repl->valid_hooks != t->valid_hooks) { + ret = -EINVAL; goto free_unlock; + } if (repl->num_counters && repl->num_counters != t->private->nentries) { ret = -EINVAL; |