ACK: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
Cengiz Can
cengiz.can at canonical.com
Fri Nov 18 04:50:49 UTC 2022
- Previous message (by thread): ACK: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Next message (by thread): APPLIED[All, but OEM-5.14]: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
On Wed, 2022-11-16 at 22:08 -0300, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A race condition between setsockopt(IPV6_ADDRFORM) and setsockopt(IPV6_DSTOPTS)
> may lead to a memory leak. A local attacker could use this to cause a denial of service.
>
> [Backport]
> A single conflict was fixed for all versions. release_sock has been replaced
> by sockopt_release_sock upstream, which introduces a new support for BPF
> calling setsockopt. So, not something we should backport under risk of regressions.
>
> [Potential regression]
> Programs using setsockopt and mixing IPv6 and IPv4 sockets might fail.
>
> Kuniyuki Iwashima (1):
> tcp/udp: Fix memory leak in ipv6_renew_options().
Acked-by: Cengiz Can <cengiz.can at canonical.com>
>
> net/ipv6/ipv6_sockglue.c | 7 +++++++
> 1 file changed, 7 insertions(+)
>
> --
> 2.34.1
>
>
- Previous message (by thread): ACK: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Next message (by thread): APPLIED[All, but OEM-5.14]: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3524
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list