[SRU][J/N/P][PATCH 0/2] CVE-2025-39964
Ian Whitfield
ian.whitfield at canonical.com
Wed Oct 15 22:48:28 UTC 2025
[Impact]
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
Issuing two writes to the same af_alg socket is bogus as the
data will be interleaved in an unpredictable fashion. Furthermore,
concurrent writes may create inconsistencies in the internal
socket state.
Disallow this by adding a new ctx->write field that indiciates
exclusive ownership for writing.
[Backport]
The fix commit for this CVE has a follow-up to address a bug in the fix commit.
Both commits cherry-picked cleanly, the same .patch files can be used for Jammy,
Noble, and Plucky. Questing was already fixed.
[Fix]
Questing: Not affected
Plucky: Cherry pick fix + follow-up
Noble: Cherry pick fix + follow-up
Jammy: Cherry pick fix + follow-up
Focal: Sent to ESM ML
Bionic: Sent to ESM ML
Xenial: Sent to ESM ML
Trusty: Ignored, not a critical CVE
[Test Case]
Compile and boot tested.
[Where problems could occur]
This fix affects those who use the user space interface to the kernel's crypto
algorithms (CONFIG_CRYPTO_USER_API enabled). An issue with this fix would be
visible to the user as race conditions or lockups when sending messages to the
kernel's cryptography interface.
Eric Biggers (1):
crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
Herbert Xu (1):
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
crypto/af_alg.c | 7 +++++++
include/crypto/if_alg.h | 10 ++++++----
2 files changed, 13 insertions(+), 4 deletions(-)
--
2.43.0
More information about the kernel-team
mailing list