summaryrefslogtreecommitdiff
path: root/security/inode.c
diff options
context:
space:
mode:
authorIdo Schimmel <idosch@mellanox.com>2017-12-20 19:34:19 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-01-02 20:33:26 +0100
commit169a9861c638a9943fd3fb9b72f75cce4eb83021 (patch)
tree016c99ef450450ea291f413c06099d68d93d4f96 /security/inode.c
parent4033c396f80c56b643259876937097728bf5514b (diff)
ipv4: Fix use-after-free when flushing FIB tables
[ Upstream commit b4681c2829e24943aadd1a7bb3a30d41d0a20050 ] Since commit 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse") the local table uses the same trie allocated for the main table when custom rules are not in use. When a net namespace is dismantled, the main table is flushed and freed (via an RCU callback) before the local table. In case the callback is invoked before the local table is iterated, a use-after-free can occur. Fix this by iterating over the FIB tables in reverse order, so that the main table is always freed after the local table. v3: Reworded comment according to Alex's suggestion. v2: Add a comment to make the fix more explicit per Dave's and Alex's feedback. Fixes: 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse") Signed-off-by: Ido Schimmel <idosch@mellanox.com> Reported-by: Fengguang Wu <fengguang.wu@intel.com> Acked-by: Alexander Duyck <alexander.h.duyck@intel.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security/inode.c')
0 files changed, 0 insertions, 0 deletions