Skip to content

Commit e8a9008

Browse files
committed
net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
jira VULN-34673 jira VULN-8840 cve CVE-2023-4208 cve CVE-2023-4218 commit-author valis <sec@valis.email> commit 3044b16 When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. Fix this by no longer copying the tcf_result struct from the old filter. Fixes: de5df63 ("net: sched: cls_u32 changes to knode must appear atomic to readers") Reported-by: valis <sec@valis.email> Reported-by: M A Ramdhan <ramdhan@starlabs.sg> Signed-off-by: valis <sec@valis.email> Signed-off-by: Jamal Hadi Salim <jhs@mojatatu.com> Reviewed-by: Victor Nogueira <victor@mojatatu.com> Reviewed-by: Pedro Tammela <pctammela@mojatatu.com> Reviewed-by: M A Ramdhan <ramdhan@starlabs.sg> Link: https://lore.kernel.org/r/20230729123202.72406-2-jhs@mojatatu.com Signed-off-by: Jakub Kicinski <kuba@kernel.org> (cherry picked from commit 3044b16) Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
1 parent 6a5e619 commit e8a9008

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

net/sched/cls_u32.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -811,7 +811,6 @@ static struct tc_u_knode *u32_init_knode(struct net *net, struct tcf_proto *tp,
811811

812812
new->ifindex = n->ifindex;
813813
new->fshift = n->fshift;
814-
new->res = n->res;
815814
new->flags = n->flags;
816815
RCU_INIT_POINTER(new->ht_down, ht);
817816

0 commit comments

Comments
 (0)