APPLIED[All, but OEM-5.14]: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
Stefan Bader
stefan.bader at canonical.com
Mon Nov 21 10:59:49 UTC 2022
- Previous message (by thread): ACK: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Next message (by thread): APPLIED [OEM-5.14] Re: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
On 17.11.22 02:08, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A race condition between setsockopt(IPV6_ADDRFORM) and setsockopt(IPV6_DSTOPTS)
> may lead to a memory leak. A local attacker could use this to cause a denial of service.
>
> [Backport]
> A single conflict was fixed for all versions. release_sock has been replaced
> by sockopt_release_sock upstream, which introduces a new support for BPF
> calling setsockopt. So, not something we should backport under risk of regressions.
>
> [Potential regression]
> Programs using setsockopt and mixing IPv6 and IPv4 sockets might fail.
>
> Kuniyuki Iwashima (1):
> tcp/udp: Fix memory leak in ipv6_renew_options().
>
> net/ipv6/ipv6_sockglue.c | 7 +++++++
> 1 file changed, 7 insertions(+)
>
Applied to all but OEM-5.14. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221121/4d0fd8c0/attachment.sig>
- Previous message (by thread): ACK: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Next message (by thread): APPLIED [OEM-5.14] Re: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list