Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2219771/?format=api
{ "id": 2219771, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2219771/?format=api", "project": { "id": 26, "url": "http://patchwork.ozlabs.org/api/1.0/projects/26/?format=api", "name": "Netfilter Development", "link_name": "netfilter-devel", "list_id": "netfilter-devel.vger.kernel.org", "list_email": "netfilter-devel@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<89bf7d5997ef9cbb0902518677c6ec5f4de7e56b.1775260446.git.zcliangcn@gmail.com>", "date": "2026-04-04T09:39:47", "name": "[nf,v2,1/2] netfilter: ip6t_eui64: reject invalid MAC header for all packets", "commit_ref": null, "pull_url": null, "state": "under-review", "archived": false, "hash": "3ab7e9f3f0355c115ac542c17f4e9ae2c1804225", "submitter": { "id": 92912, "url": "http://patchwork.ozlabs.org/api/1.0/people/92912/?format=api", "name": "Ren Wei", "email": "n05ec@lzu.edu.cn" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/patch/89bf7d5997ef9cbb0902518677c6ec5f4de7e56b.1775260446.git.zcliangcn@gmail.com/mbox/", "series": [ { "id": 498710, "url": "http://patchwork.ozlabs.org/api/1.0/series/498710/?format=api", "date": "2026-04-04T09:39:47", "name": "[nf,v2,1/2] netfilter: ip6t_eui64: reject invalid MAC header for all packets", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/498710/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2219771/checks/", "tags": {}, "headers": { "Return-Path": "\n <netfilter-devel+bounces-11627-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "netfilter-devel@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-11627-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=4.193.249.245", "smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=lzu.edu.cn", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=lzu.edu.cn" ], "Received": [ "from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fnrF32ZxCz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 20:40:55 +1100 (AEDT)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 399273018AF8\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 4 Apr 2026 09:40:46 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 2C6E93A8743;\n\tSat, 4 Apr 2026 09:40:45 +0000 (UTC)", "from azure-sdnproxy.icoremail.net (azure-sdnproxy.icoremail.net\n [4.193.249.245])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 902B43A7F52;\n\tSat, 4 Apr 2026 09:40:39 +0000 (UTC)", "from enjou-Legion-Y7000P-2019.coin-barley.ts.net (unknown\n [172.23.56.36])\n\tby app1 (Coremail) with SMTP id ygmowADnXwB93NBps2+lAA--.38592S2;\n\tSat, 04 Apr 2026 17:40:14 +0800 (CST)" ], "ARC-Seal": "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1775295644; cv=none;\n b=ZEb9F1vML7IlIbj8HmAOl7WBZniOYks82ijLLbrV9zKgpnlgkQnntib1gtHjy49jFnKCuhpG55u9jvE1x+n4KpZV40fVBe4fTgILsoyfG/RI0O4s8fEjeVpteKD2GyAUjBjxgbw6N3Qidju282bLEvCXNaj4MoGQyzwQIuvml4c=", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1775295644; c=relaxed/simple;\n\tbh=QGGjTspDMpFhM1XzLTZu7uZb0YzfwmyvxKR3zZdIklo=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version;\n b=ssxQx5ELc95fQUS28kYDZ4BpK+c57r6xoMY8gRCB7aaXEYf5NO9/8PRY/aPmSpkQ+FDmUu8UN2SS6zu/SHMsBjrLvYelHmHWCEoipMUBMjWuXodcE9ULqm1KlmZBBoHG47WnJI6tSZwCMxKOiR6hQOpKYu6SMMlBfJnKafw4RHo=", "ARC-Authentication-Results": "i=1; smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=lzu.edu.cn;\n spf=pass smtp.mailfrom=lzu.edu.cn; arc=none smtp.client-ip=4.193.249.245", "From": "Ren Wei <n05ec@lzu.edu.cn>", "To": "netfilter-devel@vger.kernel.org,\n\tnetdev@vger.kernel.org", "Cc": "pablo@netfilter.org,\n\tfw@strlen.de,\n\tphil@nwl.cc,\n\tdavem@davemloft.net,\n\tdsahern@kernel.org,\n\tedumazet@google.com,\n\tkuba@kernel.org,\n\tpabeni@redhat.com,\n\thorms@kernel.org,\n\tyifanwucs@gmail.com,\n\ttomapufckgml@gmail.com,\n\tyuantan098@gmail.com,\n\tbird@lzu.edu.cn,\n\tenjou1224z@gmail.com,\n\tzcliangcn@gmail.com,\n\tn05ec@lzu.edu.cn", "Subject": "[PATCH nf v2 1/2] netfilter: ip6t_eui64: reject invalid MAC header\n for all packets", "Date": "Sat, 4 Apr 2026 17:39:47 +0800", "Message-ID": "\n <89bf7d5997ef9cbb0902518677c6ec5f4de7e56b.1775260446.git.zcliangcn@gmail.com>", "X-Mailer": "git-send-email 2.51.0", "In-Reply-To": "<cover.1774859629.git.zcliangcn@gmail.com>", "References": "<cover.1774859629.git.zcliangcn@gmail.com>", "Precedence": "bulk", "X-Mailing-List": "netfilter-devel@vger.kernel.org", "List-Id": "<netfilter-devel.vger.kernel.org>", "List-Subscribe": "<mailto:netfilter-devel+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:netfilter-devel+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-CM-TRANSID": "ygmowADnXwB93NBps2+lAA--.38592S2", "X-Coremail-Antispam": "1UD129KBjvJXoW7uFy3GryDXFWruFy5AF4xJFb_yoW8ur48pr\n\tZxGry8JayDJr1akr4v9ry8XFW5Aa1kGF1IgFZ0y34vgwn8urs5Ja98Kr4UZa40yrs8KFZY\n\tyr90vr98G3Z8Z37anT9S1TB71UUUUU7qnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2\n\t9KBjDU0xBIdaVrnRJUUUBY1xkIjI8I6I8E6xAIw20EY4v20xvaj40_JFC_Wr1l1IIY67AE\n\tw4v_Jr0_Jr4l8cAvFVAK0II2c7xJM28CjxkF64kEwVA0rcxSw2x7M28EF7xvwVC0I7IYx2\n\tIY67AKxVW8JVW5JwA2z4x0Y4vE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwA2z4x0Y4vEx4A2\n\tjsIE14v26F4UJVW0owA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_Cr1j6rxdM2AIxVAIcxkEcV\n\tAq07x20xvEncxIr21l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1j\n\t6r18McIj6I8E87Iv67AKxVWUJVW8JwAm72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64\n\tvIr41lF7I21c0EjII2zVCS5cI20VAGYxC7M4IIrI8v6xkF7I0E8cxan2IY04v7MxkF7I0E\n\tn4kS14v26r4a6rW5MxkIecxEwVCm-wCF04k20xvY0x0EwIxGrwCF04k20xvE74AGY7Cv6c\n\tx26r48MxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCj\n\tr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVW8ZVWrXwCIc40Y0x0EwIxGrwCI42IY6x\n\tIIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwCI42IY6xAI\n\tw20EY4v20xvaj40_Jr0_JF4lIxAIcVC2z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY1x\n\t0267AKxVW8JVW8JrUvcSsGvfC2KfnxnUUI43ZEXa7sRi_HU3UUUUU==", "X-CM-SenderInfo": "zqqvvuo6o23hxhgxhubq/1tbiAQQHCWnP4nwFqgAAsc" }, "content": "From: Zhengchuan Liang <zcliangcn@gmail.com>\n\n`eui64_mt6()` derives a modified EUI-64 from the Ethernet source\naddress and compares it with the low 64 bits of the IPv6 source\naddress.\n\nThe existing guard only rejects an invalid MAC header when\n`par->fragoff != 0`. For packets with `par->fragoff == 0`,\n`eui64_mt6()` can still reach `eth_hdr(skb)` even when the MAC header\nis not valid.\n\nFix this by removing the `par->fragoff != 0` condition so that packets\nwith an invalid MAC header are rejected before accessing `eth_hdr(skb)`.\n\nFixes: 1da177e4c3f41 (\"Linux-2.6.12-rc2\")\nReported-by: Yifan Wu <yifanwucs@gmail.com>\nReported-by: Juefei Pu <tomapufckgml@gmail.com>\nCo-developed-by: Yuan Tan <yuantan098@gmail.com>\nSigned-off-by: Yuan Tan <yuantan098@gmail.com>\nSuggested-by: Xin Liu <bird@lzu.edu.cn>\nTested-by: Ren Wei <enjou1224z@gmail.com>\nSigned-off-by: Zhengchuan Liang <zcliangcn@gmail.com>\nSigned-off-by: Ren Wei <n05ec@lzu.edu.cn>\n---\nChanges in v2:\nThis patch specifically fixes the memory-safety issue in `eui64_mt6()`:\nthe old guard only rejected invalid MAC headers for non-first fragments,\nwhile our PoC triggers the KASAN report with a non-fragment packet\n(`par->fragoff == 0`). This patch is sufficient enough to fix the\nmemory-safety issue, and we do not find other `eth_hdr(skb)` users with\nsimilar use-after-free or out-of-bound issues.\n\n net/ipv6/netfilter/ip6t_eui64.c | 3 +--\n 1 file changed, 1 insertion(+), 2 deletions(-)", "diff": "diff --git a/net/ipv6/netfilter/ip6t_eui64.c b/net/ipv6/netfilter/ip6t_eui64.c\nindex d704f7ed300c2..da69a27e8332c 100644\n--- a/net/ipv6/netfilter/ip6t_eui64.c\n+++ b/net/ipv6/netfilter/ip6t_eui64.c\n@@ -22,8 +22,7 @@ eui64_mt6(const struct sk_buff *skb, struct xt_action_param *par)\n \tunsigned char eui64[8];\n \n \tif (!(skb_mac_header(skb) >= skb->head &&\n-\t skb_mac_header(skb) + ETH_HLEN <= skb->data) &&\n-\t par->fragoff != 0) {\n+\t skb_mac_header(skb) + ETH_HLEN <= skb->data)) {\n \t\tpar->hotdrop = true;\n \t\treturn false;\n \t}\n", "prefixes": [ "nf", "v2", "1/2" ] }