stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Please cherry-pick 5edabca9d4cf (CVE-2017-6074) for all stable kernels
@ 2017-02-23 17:35 Thomas Deutschmann
  2017-02-23 17:55 ` Please cherry-pick 5edabca9d4cf (CVE-2017-6074) for all stable kernels,Please " David Miller
  2017-02-23 17:57 ` Please " Greg KH
  0 siblings, 2 replies; 3+ messages in thread
From: Thomas Deutschmann @ 2017-02-23 17:35 UTC (permalink / raw)
  To: stable@vger.kernel.org; +Cc: andreyknvl, edumazet, davem


[-- Attachment #1.1: Type: text/plain, Size: 1378 bytes --]

Hi,

haven't seen commit

> From 5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4 Mon Sep 17 00:00:00 2001
> From: Andrey Konovalov <andreyknvl@google.com>
> Date: Thu, 16 Feb 2017 17:22:46 +0100
> Subject: dccp: fix freeing skb too early for IPV6_RECVPKTINFO
> 
> In the current DCCP implementation an skb for a DCCP_PKT_REQUEST packet
> is forcibly freed via __kfree_skb in dccp_rcv_state_process if
> dccp_v6_conn_request successfully returns.
> 
> However, if IPV6_RECVPKTINFO is set on a socket, the address of the skb
> is saved to ireq->pktopts and the ref count for skb is incremented in
> dccp_v6_conn_request, so skb is still in use. Nevertheless, it gets freed
> in dccp_rcv_state_process.
> 
> Fix by calling consume_skb instead of doing goto discard and therefore
> calling __kfree_skb.
> 
> Similar fixes for TCP:
> 
> fb7e2399ec17f1004c0e0ccfd17439f8759ede01 [TCP]: skb is unexpectedly freed.
> 0aea76d35c9651d55bbaf746e7914e5f9ae5a25d tcp: SYN packets are now
> simply consumed
> 
> Signed-off-by: Andrey Konovalov <andreyknvl@google.com>
> Acked-by: Eric Dumazet <edumazet@google.com>
> Signed-off-by: David S. Miller <davem@davemloft.net>

in recent LTS kernel releases (3.2.85, 3.16.40, 4.4.51, 4.9.12...) nor
found any information that this patch is queued.

Could you please cherry-pick?

Thanks!


-- 
Regards,
Thomas



[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 951 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2017-02-23 17:59 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-02-23 17:35 Please cherry-pick 5edabca9d4cf (CVE-2017-6074) for all stable kernels Thomas Deutschmann
2017-02-23 17:55 ` Please cherry-pick 5edabca9d4cf (CVE-2017-6074) for all stable kernels,Please " David Miller
2017-02-23 17:57 ` Please " Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).