Files
linux/net
Eric Dumazet 176c6b591b net: merge CVE-2018-5391 patch
PD#172028 merge CVE patch

inet: frag: enforce memory limits earlier

[ Upstream commit 56e2c94f05 ]

We currently check current frags memory usage only when
a new frag queue is created. This allows attackers to first
consume the memory budget (default : 4 MB) creating thousands
of frag queues, then sending tiny skbs to exceed high_thresh
limit by 2 to 3 order of magnitude.

Note that before commit 648700f76b ("inet: frags: use rhashtables
for reassembly units"), work queue could be starved under DOS,
getting no cpu cycles.
After commit 648700f76b, only the per frag queue timer can eventually
remove an incomplete frag queue and its skbs.

Change-Id: I93236ff2764c02ad347339872b05b6f4dce7a06a
Fixes: b13d3cbfb8 ("inet: frag: move eviction of queues to work queue")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Jann Horn <jannh@google.com>
Cc: Florian Westphal <fw@strlen.de>
Cc: Peter Oskolkov <posk@google.com>
Cc: Paolo Abeni <pabeni@redhat.com>
Acked-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-09-04 19:03:37 -07:00
..
2015-03-02 16:43:41 -05:00
2018-05-16 10:08:44 +02:00
2018-07-17 12:36:18 +02:00
2018-06-13 16:37:10 +02:00
2016-12-03 23:54:25 -05:00
2017-11-15 15:53:17 +01:00
2018-04-13 19:48:29 +02:00
2018-09-04 19:03:37 -07:00
2018-07-17 12:36:18 +02:00
2018-05-19 14:06:17 +02:00
2016-05-29 22:33:25 -07:00
2016-10-20 11:23:08 -04:00
2018-07-17 12:36:18 +02:00
2018-05-30 13:19:56 +02:00
2018-06-13 16:16:42 +02:00
2018-05-30 07:50:32 +02:00
2018-05-30 07:50:25 +02:00
2018-05-16 11:39:34 +02:00
2018-04-24 11:26:46 +02:00
2016-08-17 19:36:23 -04:00
2018-01-31 14:13:00 +01:00