netfilter: xt_hashlimit: unregister proc file before releasing mutex
commit 99b79c39 upstream. Before releasing the global mutex, we only unlink the hashtable from the hash list, its proc file is still not unregistered at this point. So syzbot could trigger a race condition where a parallel htable_create() could register the same file immediately after the mutex is released. Move htable_remove_proc_entry() back to mutex protection to fix this. And, fold htable_destroy() into htable_put() to make the code slightly easier to understand. Reported-and-tested-by:<syzbot+d195fd3b9a364ddd6731@syzkaller.appspotmail.com> Fixes: c4a3922d ("netfilter: xt_hashlimit: reduce hashlimit_mutex scope for htable_put()") Signed-off-by:
Cong Wang <xiyou.wangcong@gmail.com> Signed-off-by:
Pablo Neira Ayuso <pablo@netfilter.org> Signed-off-by:
Paul Gortmaker <paul.gortmaker@windriver.com>
Loading
Please register or sign in to comment