ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()
authorEric Dumazet <edumazet@google.com>
Fri, 20 Jan 2023 13:30:40 +0000 (13:30 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 1 Feb 2023 07:34:45 +0000 (08:34 +0100)
commit6850fe301d015a7d2012d1de8caf43dafb7cc2f6
tree7253102e24383fbbd9e8a9298b09484785d67b2b
parentda553c7ca82fd4c878407853b236360ff0eddcfb
ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()

[ Upstream commit 1d1d63b612801b3f0a39b7d4467cad0abd60e5c8 ]

if (!type)
continue;
if (type > RTAX_MAX)
return -EINVAL;
...
metrics[type - 1] = val;

@type being used as an array index, we need to prevent
cpu speculation or risk leaking kernel memory content.

Fixes: 6cf9dfd3bd62 ("net: fib: move metrics parsing to a helper")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Link: https://lore.kernel.org/r/20230120133040.3623463-1-edumazet@google.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
net/ipv4/metrics.c