[SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
Thadeu Lima de Souza Cascardo
cascardo at canonical.com
Thu Nov 17 01:08:58 UTC 2022
[Impact]
A race condition between setsockopt(IPV6_ADDRFORM) and setsockopt(IPV6_DSTOPTS)
may lead to a memory leak. A local attacker could use this to cause a denial of service.
[Backport]
A single conflict was fixed for all versions. release_sock has been replaced
by sockopt_release_sock upstream, which introduces a new support for BPF
calling setsockopt. So, not something we should backport under risk of regressions.
[Potential regression]
Programs using setsockopt and mixing IPv6 and IPv4 sockets might fail.
Kuniyuki Iwashima (1):
tcp/udp: Fix memory leak in ipv6_renew_options().
net/ipv6/ipv6_sockglue.c | 7 +++++++
1 file changed, 7 insertions(+)
--
2.34.1
More information about the kernel-team
mailing list