[SRU][J/N/P][PATCH 0/1] CVE-2025-38617

Tim Whisonant tim.whisonant at canonical.com
Tue Aug 26 20:55:32 UTC 2025


SRU Justification:

[Impact]

net/packet: fix a race in packet_set_ring() and packet_notifier()

When packet_set_ring() releases po->bind_lock, another thread can
run packet_notifier() and process an NETDEV_UP event.

This race and the fix are both similar to that of commit 15fe076edea7
("net/packet: fix a race in packet_bind() and packet_notifier()").

There too the packet_notifier NETDEV_UP event managed to run while a
po->bind_lock critical section had to be temporarily released. And
the fix was similarly to temporarily set po->num to zero to keep
the socket unhooked until the lock is retaken.

The po->bind_lock in packet_set_ring and packet_notifier precede the
introduction of git history.

[Fix]

Plucky:   applied Noble patch
Noble:    cherry picked from upstream
Jammy:    cherry picked from upstream
Focal:    patch sent to ESM ML
Bionic:   patch sent to ESM ML
Xenial:   patch sent to ESM ML
Trusty:   out of scope (medium CVE)

[Test Plan]

Compile and boot tested.

[Where problems could occur]

The changes affect the raw packet sockets implementation. Issues
might manifest as mishandled packets.

Quang Le (1):
  net/packet: fix a race in packet_set_ring() and packet_notifier()

 net/packet/af_packet.c | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

-- 
2.43.0




More information about the kernel-team mailing list