NACK: [SRU][Mantic][Lunar][Jammy][PATCH 0/1] CVE-2023-6176

Bethany Jamison bethany.jamison at canonical.com
Tue Nov 21 18:07:02 UTC 2023


I forgot to modify the release tags for the patch file to match the tags 
on the cover letter.

On 11/21/23 11:31 AM, Bethany Jamison wrote:
> [Impact]
>
> A null pointer dereference flaw was found in the Linux kernel API for the
> cryptographic algorithm scatterwalk functionality. This issue occurs when a
> user constructs a malicious packet with specific socket configuration,
> which could allow a local user to crash the system or escalate their
> privileges on the system.
>
> [Fix]
>
> Clean cherry-pick.
>
> [Test Case]
>
> Compile and boot test.
>
> [Where problems could occur]
>
> Issues could occur in tls.
>
> Liu Jian (1):
>    net/tls: do not free tls_rec on async operation in
>      bpf_exec_tx_verdict()
>
>   net/tls/tls_sw.c | 4 ++--
>   1 file changed, 2 insertions(+), 2 deletions(-)
>



More information about the kernel-team mailing list