ACK: [SRU][O/N/J][PATCH 0/1] CVE-2024-53103

Philip Cox philip.cox at canonical.com
Wed Dec 18 17:46:24 UTC 2024


On 2024-12-13 3:13 p.m., Bethany Jamison wrote:
> [Impact]
>
> hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
>
> When hvs is released, there is a possibility that vsk->trans may not
> be initialized to NULL, which could lead to a dangling pointer.
> This issue is resolved by initializing vsk->trans to NULL.
>
> [Fix]
>
> Oracular: Clean cherry-pick
> Noble:	  Oracular patch applied cleanly
> Jammmy:	  Oracuaar patch applied cleanly
> Focal:	  Patch already applied via stable team (0d3fe569af8205a3c8f96b54b1a5a7a14c5f5250)
> Bionic:	  Fix sent to esm ML
> Xenial:	  not-affected
> Trusty:	  not-affected
>
> [Test Case]
>
> Compile and boot tested.
>
> [Where problems could occur]
>
> This fix affects those who use Hyper-B transport for vsock, an issue with
> this fix would be visible to the user via memory corruption or a system
> crash.
>
> Hyunwoo Kim (1):
>    hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer


Acked-by: Philip Cox <philip.cox at canonical.com>


>   net/vmw_vsock/hyperv_transport.c | 1 +
>   1 file changed, 1 insertion(+)
>



More information about the kernel-team mailing list