android_kernel_google_msm/net/bridge
Thomas Graf 8ed40c1229 netfilter: Can't fail and free after table replacement
commit c58dd2dd44 upstream.

All xtables variants suffer from the defect that the copy_to_user()
to copy the counters to user memory may fail after the table has
already been exchanged and thus exposed. Return an error at this
point will result in freeing the already exposed table. Any
subsequent packet processing will result in a kernel panic.

We can't copy the counters before exposing the new tables as we
want provide the counter state after the old table has been
unhooked. Therefore convert this into a silent error.

Cc: Florian Westphal <fw@strlen.de>
Signed-off-by: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2014-05-18 05:25:56 -07:00
..
netfilter netfilter: Can't fail and free after table replacement 2014-05-18 05:25:56 -07:00
br.c
br_device.c
br_fdb.c
br_forward.c
br_if.c bridge: flush br's address entry in fdb when remove the bridge dev 2013-12-08 07:29:42 -08:00
br_input.c
br_ioctl.c
br_multicast.c bridge: multicast: add sanity check for query source addresses 2014-04-26 17:13:16 -07:00
br_netfilter.c
br_netlink.c
br_notify.c
br_private.h bridge: Clamp forward_delay when enabling STP 2013-10-13 15:42:47 -07:00
br_private_stp.h
br_stp.c bridge: Clamp forward_delay when enabling STP 2013-10-13 15:42:47 -07:00
br_stp_bpdu.c
br_stp_if.c bridge: Correctly clamp MAX forward_delay when enabling STP 2013-11-04 04:23:40 -08:00
br_stp_timer.c
br_sysfs_br.c
br_sysfs_if.c
Kconfig
Makefile