]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
netfilter: nf_tables: release flowtable after rcu grace period on error
authorPablo Neira Ayuso <pablo@netfilter.org>
Tue, 17 Mar 2026 19:00:26 +0000 (20:00 +0100)
committerFlorian Westphal <fw@strlen.de>
Thu, 19 Mar 2026 09:26:31 +0000 (10:26 +0100)
Call synchronize_rcu() after unregistering the hooks from error path,
since a hook that already refers to this flowtable can be already
registered, exposing this flowtable to packet path and nfnetlink_hook
control plane.

This error path is rare, it should only happen by reaching the maximum
number hooks or by failing to set up to hardware offload, just call
synchronize_rcu().

There is a check for already used device hooks by different flowtable
that could result in EEXIST at this late stage. The hook parser can be
updated to perform this check earlier to this error path really becomes
rarely exercised.

Uncovered by KASAN reported as use-after-free from nfnetlink_hook path
when dumping hooks.

Fixes: 3b49e2e94e6e ("netfilter: nf_tables: add flow table netlink frontend")
Reported-by: Yiming Qian <yimingqian591@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Florian Westphal <fw@strlen.de>
net/netfilter/nf_tables_api.c

index 9b1c8d0a35fb2a43719c6b2ee6890f7dbf15181f..3922cff1bb3d96da36f048b8d47d20b35941eb47 100644 (file)
@@ -9203,6 +9203,7 @@ static int nf_tables_newflowtable(struct sk_buff *skb,
        return 0;
 
 err_flowtable_hooks:
+       synchronize_rcu();
        nft_trans_destroy(trans);
 err_flowtable_trans:
        nft_hooks_destroy(&flowtable->hook_list);