lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 19 Jun 2012 14:13:03 -0700 (PDT) From: David Miller <davem@...emloft.net> To: tgraf@...g.ch Cc: nhorman@...driver.com, netdev@...r.kernel.org Subject: Re: [PATCH] ipv6: Prevent access to uninitialized fib_table_hash via /proc/net/ipv6_route From: Thomas Graf <tgraf@...g.ch> Date: Tue, 19 Jun 2012 07:36:02 -0400 > On Fri, Jun 15, 2012 at 03:32:40PM -0700, David Miller wrote: >> Since you're snooping around in here, you might notice that on network >> namespace shutdown, we leak all user configured ipv6 FIB rules. > > I looked into this. fib_rules_unregister() will free all rules > belonging to the address family in that namespace. > > Or were you referring to other rules? Sorry, the leak I saw was for the fib6 tables, not the rules themselves. IPV4 has ip_fib_net_exit() which walks the FIB4 table hash and releases everything. I couldn't find the IPV6 counterpart. All I could find was code which explicitly liberates the ipv6 main and local tables. There is no ipv6 code I can find which traverses fib_table_hash and liberates the dynamically generated tables. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists