mint0x33/net/hsr
YueHaibing 4b351609af net: hsr: Fix potential use-after-free
[ Upstream commit 7e177d32442b7ed08a9fa61b61724abc548cb248 ]

The skb is delivered to netif_rx() which may free it, after calling this,
dereferencing skb may trigger use-after-free.

Fixes: f421436a59 ("net/hsr: Add support for the High-availability Seamless Redundancy protocol (HSRv0)")
Signed-off-by: YueHaibing <yuehaibing@huawei.com>
Link: https://lore.kernel.org/r/20221125075724.27912-1-yuehaibing@huawei.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2022-12-08 11:16:32 +01:00
..
hsr_device.c
hsr_device.h
hsr_forward.c net: hsr: Fix potential use-after-free 2022-12-08 11:16:32 +01:00
hsr_forward.h
hsr_framereg.c hsr: use netdev_err() instead of WARN_ONCE() 2021-05-22 10:57:24 +02:00
hsr_framereg.h
hsr_main.c
hsr_main.h
hsr_netlink.c hsr: check protocol version in hsr_newlink() 2020-04-24 08:00:52 +02:00
hsr_netlink.h
hsr_slave.c
hsr_slave.h
Kconfig
Makefile