<div dir="ltr"><div>Forgot to send a message on Friday, sending for completeness. <br></div><div><br></div><div>Applied to kinetic and bionic linux master-next, <br></div><div><br></div><div>- Luke<br></div><div><br></div><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, Feb 3, 2023 at 2:58 AM Stefan Bader <<a href="mailto:stefan.bader@canonical.com">stefan.bader@canonical.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">The fix for the CVE pulled in a code snippet which uses some error<br>
variable which is pre-set to -EADDRINUSE. Some backports drop the<br>
assignment, others don't. But in either way this causes issues because<br>
after passing the new check, err is 0 but later on a failing call to<br>
get_port() needs the pre-assignment because it returns 0/1 and not an<br>
errno.<br>
<br>
The submitted patch applies to K/J directly and needs some context<br>
adjustments in F/B.<br>
<br>
Stefan Bader (1):<br>
UBUNTU: SAUCE: Fix inet_csk_listen_start after CVE-2023-0461<br>
<br>
net/ipv4/inet_connection_sock.c | 4 +++-<br>
1 file changed, 3 insertions(+), 1 deletion(-)<br>
<br>
-- <br>
2.34.1<br>
<br>
<br>
-- <br>
kernel-team mailing list<br>
<a href="mailto:kernel-team@lists.ubuntu.com" target="_blank">kernel-team@lists.ubuntu.com</a><br>
<a href="https://lists.ubuntu.com/mailman/listinfo/kernel-team" rel="noreferrer" target="_blank">https://lists.ubuntu.com/mailman/listinfo/kernel-team</a><br>
</blockquote></div></div>