[PATCH 0/8] [backports] l2tp use-after-free fixes for 4.4 stable

From: Will Deacon
Date: Thu Apr 02 2020 - 13:32:59 EST


Hi Greg,

Syzbot has been complaining about KASAN splats due to use-after-free
issues in the l2tp code on 4.4 Android kernels (although I reproduced
with latest 4.4 stable on my laptop):

https://syzkaller.appspot.com/bug?id=de316389db0fa0cd7ced6e564601ea8e56625ebc

These have been fixed upstream, but for some reason didn't get picked up
for stable. This series applies to 4.4.y and I've sent patches for 4.9
separately.

Thanks,

Will

--->8


Gao Feng (1):
l2tp: Refactor the codes with existing macros instead of literal
number

Guillaume Nault (5):
l2tp: fix race in l2tp_recv_common()
l2tp: ensure session can't get removed during pppol2tp_session_ioctl()
l2tp: fix duplicate session creation
l2tp: ensure sessions are freed after their PPPOL2TP socket
l2tp: fix race between l2tp_session_delete() and
l2tp_tunnel_closeall()

Shmulik Ladkani (1):
net: l2tp: Make l2tp_ip6 namespace aware

phil.turnbull@xxxxxxxxxx (1):
l2tp: Correctly return -EBADF from pppol2tp_getname.

net/l2tp/l2tp_core.c | 149 ++++++++++++++++++++++++++++++++++---------
net/l2tp/l2tp_core.h | 4 ++
net/l2tp/l2tp_eth.c | 10 +--
net/l2tp/l2tp_ip.c | 17 +++--
net/l2tp/l2tp_ip6.c | 28 +++++---
net/l2tp/l2tp_ppp.c | 110 ++++++++++++++++----------------
6 files changed, 211 insertions(+), 107 deletions(-)

--
2.26.0.rc2.310.g2932bb562d-goog