netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
authorFlorian Westphal <fw@strlen.de>
Tue, 17 Jul 2018 19:03:15 +0000 (21:03 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 28 Aug 2018 05:21:37 +0000 (07:21 +0200)
commitc022960cd731d3aa9df43a478cabae0b4c1f5bf4
tree8ff3543324a06dce1672ee8a57ea971b12bb1582
parent966e597ed466a49c616d3647b144cbc6493bf7de
netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state

commit 6613b6173dee098997229caf1f3b961c49da75e6 upstream.

When first DCCP packet is SYNC or SYNCACK, we insert a new conntrack
that has an un-initialized timeout value, i.e. such entry could be
reaped at any time.

Mark them as INVALID and only ignore SYNC/SYNCACK when connection had
an old state.

Reported-by: syzbot+6f18401420df260e37ed@syzkaller.appspotmail.com
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/netfilter/nf_conntrack_proto_dccp.c