You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
jira VULN-38769
cve CVE-2024-42285
commit-author Bart Van Assche <[email protected]>
commit aee2424
iw_conn_req_handler() associates a new struct rdma_id_private (conn_id) with
an existing struct iw_cm_id (cm_id) as follows:
conn_id->cm_id.iw = cm_id;
cm_id->context = conn_id;
cm_id->cm_handler = cma_iw_handler;
rdma_destroy_id() frees both the cm_id and the struct rdma_id_private. Make
sure that cm_work_handler() does not trigger a use-after-free by only
freeing of the struct rdma_id_private after all pending work has finished.
Cc: [email protected]
Fixes: 59c68ac ("iw_cm: free cm_id resources on the last deref")
Reviewed-by: Zhu Yanjun <[email protected]>
Tested-by: Shin'ichiro Kawasaki <[email protected]>
Signed-off-by: Bart Van Assche <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Leon Romanovsky <[email protected]>
(cherry picked from commit aee2424)
Signed-off-by: Brett Mastbergen <[email protected]>
0 commit comments