You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
jira VULN-6505
cve CVE-2023-3390
commit-author Pablo Neira Ayuso <pablo@netfilter.org>
commit 26b5a57
upstream-diff: RedHat never back-ported d0e2c7d ("netfilter: nf_tables: add NFT_CHAIN_BINDING")
which has a fix netfilter: nf_tables: fix chain binding transaction logic that
adds a large switch statement both nft_immediate_deactivate and nft_immediate_activate.
This also impacts all the chain bounds as only the sets are valid in
this commit. Its only a portion of the original commit.
statement and commits for nft_chain transmission stuff
Add a new state to deal with rule expressions deactivation from the
newrule error path, otherwise the anonymous set remains in the list in
inactive state for the next generation. Mark the set/chain transaction
as unbound so the abort path releases this object, set it as inactive in
the next generation so it is not reachable anymore from this transaction
and reference counter is dropped.
Fixes: 1240eb9 ("netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE")
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
(cherry picked from commit 26b5a57)
Signed-off-by: Jonathan Maple <jmaple@ciq.com>
0 commit comments