linux-stable/net/hsr
YueHaibing b35d899854 net: hsr: Fix potential use-after-free
[ Upstream commit 7e177d3244 ]

The skb is delivered to netif_rx() which may free it, after calling this,
dereferencing skb may trigger use-after-free.

Fixes: f421436a59 ("net/hsr: Add support for the High-availability Seamless Redundancy protocol (HSRv0)")
Signed-off-by: YueHaibing <yuehaibing@huawei.com>
Link: https://lore.kernel.org/r/20221125075724.27912-1-yuehaibing@huawei.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2022-12-08 11:18:33 +01:00
..
hsr_device.c hsr: reset network header when supervision frame is created 2020-01-17 19:47:00 +01:00
hsr_device.h
hsr_forward.c net: hsr: Fix potential use-after-free 2022-12-08 11:18:33 +01:00
hsr_forward.h
hsr_framereg.c hsr: use netdev_err() instead of WARN_ONCE() 2021-05-22 10:59:24 +02:00
hsr_framereg.h
hsr_main.c
hsr_main.h
hsr_netlink.c hsr: check protocol version in hsr_newlink() 2020-04-21 09:03:03 +02:00
hsr_netlink.h
hsr_slave.c hsr: fix general protection fault in hsr_addr_is_self() 2020-04-02 15:28:10 +02:00
hsr_slave.h
Kconfig
Makefile