lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ZJHbJHKVSNpp5dBd@calendula>
Date: Tue, 20 Jun 2023 19:00:20 +0200
From: Pablo Neira Ayuso <pablo@...filter.org>
To: netfilter-devel@...r.kernel.org
Cc: davem@...emloft.net, netdev@...r.kernel.org, kuba@...nel.org,
	pabeni@...hat.com, edumazet@...gle.com
Subject: Re: [PATCH net 00/14,v2] Netfilter/IPVS fixes for net

Hi,

I found another bug on this batch.

I need a v3. Sorry for the inconvenience.

On Tue, Jun 20, 2023 at 11:35:28AM +0200, Pablo Neira Ayuso wrote:
> This is v2 addressing comments from Simon Horman.
> 
> -o-
> 
> Hi,
> 
> The following patchset contains Netfilter/IPVS fixes for net:
> 
> 1) Fix UDP segmentation with IPVS tunneled traffic, from Terin Stock.
> 
> 2) Fix chain binding transaction logic, add a bound flag to rule
>    transactions. Remove incorrect logic in nft_data_hold() and
>    nft_data_release().
> 
> 3) Add a NFT_TRANS_PREPARE_ERROR deactivate state to deal with releasing
>    the set/chain as a follow up to 1240eb93f061 ("netfilter: nf_tables:
>    incorrect error path handling with NFT_MSG_NEWRULE")
> 
> 4) Drop map element references from preparation phase instead of
>    set destroy path, otherwise bogus EBUSY with transactions such as:
> 
>         flush chain ip x y
>         delete chain ip x w
> 
>    where chain ip x y contains jump/goto from set elements.
> 
> 5) Pipapo set type does not regard generation mask from the walk
>    iteration.
> 
> 6) Fix reference count underflow in set element reference to
>    stateful object.
> 
> 7) Several patches to tighten the nf_tables API:
>    - disallow set element updates of bound anonymous set
>    - disallow unbound anonymous set/chain at the end of transaction.
>    - disallow updates of anonymous set.
>    - disallow timeout configuration for anonymous sets.
> 
> 8) Fix module reference leak in chain updates.
> 
> 9) Fix nfnetlink_osf module autoload.
> 
> 10) Fix deletion of basechain when NFTA_CHAIN_HOOK is specified as
>     in iptables-nft.
> 
> Please, pull these changes from:
> 
>   git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git nf-23-06-20
> 
> Thanks.
> 
> ----------------------------------------------------------------
> 
> The following changes since commit 0dbcac3a6dbb32c1de53ebebfd28452965e12950:
> 
>   Merge tag 'mlx5-fixes-2023-06-16' of git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux (2023-06-19 10:28:56 +0100)
> 
> are available in the Git repository at:
> 
>   git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git tags/nf-23-06-20
> 
> for you to fetch changes up to 0bbeb93db1729a135370a99d1be715fd8a59e6c0:
> 
>   netfilter: nf_tables: Fix for deleting base chains with payload (2023-06-19 23:29:18 +0200)
> 
> ----------------------------------------------------------------
> netfilter pull request 23-06-20
> 
> ----------------------------------------------------------------
> Pablo Neira Ayuso (12):
>       netfilter: nf_tables: fix chain binding transaction logic
>       netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
>       netfilter: nf_tables: drop map element references from preparation phase
>       netfilter: nft_set_pipapo: .walk does not deal with generations
>       netfilter: nf_tables: fix underflow in object reference counter
>       netfilter: nf_tables: disallow element updates of bound anonymous sets
>       netfilter: nf_tables: reject unbound anonymous set before commit phase
>       netfilter: nf_tables: reject unbound chain set before commit phase
>       netfilter: nf_tables: disallow updates of anonymous sets
>       netfilter: nf_tables: disallow timeout for anonymous sets
>       netfilter: nf_tables: drop module reference after updating chain
>       netfilter: nfnetlink_osf: fix module autoload
> 
> Phil Sutter (1):
>       netfilter: nf_tables: Fix for deleting base chains with payload
> 
> Terin Stock (1):
>       ipvs: align inner_mac_header for encapsulation
> 
>  include/net/netfilter/nf_tables.h |  31 +++-
>  net/netfilter/ipvs/ip_vs_xmit.c   |   2 +
>  net/netfilter/nf_tables_api.c     | 366 ++++++++++++++++++++++++++++++--------
>  net/netfilter/nfnetlink_osf.c     |   1 +
>  net/netfilter/nft_immediate.c     |  78 +++++++-
>  net/netfilter/nft_set_bitmap.c    |   5 +-
>  net/netfilter/nft_set_hash.c      |  23 ++-
>  net/netfilter/nft_set_pipapo.c    |  20 ++-
>  net/netfilter/nft_set_rbtree.c    |   5 +-
>  net/netfilter/xt_osf.c            |   1 -
>  10 files changed, 435 insertions(+), 97 deletions(-)
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ