APPLIED[All, but OEM-5.14]: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524

Stefan Bader stefan.bader at canonical.com
Mon Nov 21 10:59:49 UTC 2022


On 17.11.22 02:08, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A race condition between setsockopt(IPV6_ADDRFORM) and setsockopt(IPV6_DSTOPTS)
> may lead to a memory leak. A local attacker could use this to cause a denial of service.
> 
> [Backport]
> A single conflict was fixed for all versions. release_sock has been replaced
> by sockopt_release_sock upstream, which introduces a new support for BPF
> calling setsockopt. So, not something we should backport under risk of regressions.
> 
> [Potential regression]
> Programs using setsockopt and mixing IPv6 and IPv4 sockets might fail.
> 
> Kuniyuki Iwashima (1):
>    tcp/udp: Fix memory leak in ipv6_renew_options().
> 
>   net/ipv6/ipv6_sockglue.c | 7 +++++++
>   1 file changed, 7 insertions(+)
> 

Applied to all but OEM-5.14. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221121/4d0fd8c0/attachment.sig>


More information about the kernel-team mailing list