Message ID | 20231018224913.62418-1-yuxuan.luo@canonical.com |
---|---|
Headers | show |
Series | CVE-2023-42754 | expand |
This is also needed on Mantic, 6.5. Cascardo.
On 19.10.23 00:49, Yuxuan Luo wrote: > [Impact] > A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. > The socket buffer (skb) was assumed to be associated with a device before > calling __ip_options_compile, which is not always the case if the skb is > re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN > privileges to crash the system. > > [Backport] > It's a clean backport. > > [Test] > Tested against [the poc](https://vuldb.com/?exploit_url.241116) with > privilege since the exploit requires it. > > [Potential Regression] > Expect very low regression potential. > > > Kyle Zeng (1): > ipv4: fix null-deref in ipv4_link_failure > > net/ipv4/route.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > For Mantic as well Acked-by: Stefan Bader <stefan.bader@canonical.com>
On 10/18/23 4:49 PM, Yuxuan Luo wrote: > [Impact] > A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. > The socket buffer (skb) was assumed to be associated with a device before > calling __ip_options_compile, which is not always the case if the skb is > re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN > privileges to crash the system. > > [Backport] > It's a clean backport. > > [Test] > Tested against [the poc](https://vuldb.com/?exploit_url.241116) with > privilege since the exploit requires it. > > [Potential Regression] > Expect very low regression potential. > > > Kyle Zeng (1): > ipv4: fix null-deref in ipv4_link_failure > > net/ipv4/route.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > Acked-by: Tim Gardner <tim.gardner@canonical.com> For Mantic too
On 19.10.23 00:49, Yuxuan Luo wrote: > [Impact] > A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. > The socket buffer (skb) was assumed to be associated with a device before > calling __ip_options_compile, which is not always the case if the skb is > re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN > privileges to crash the system. > > [Backport] > It's a clean backport. > > [Test] > Tested against [the poc](https://vuldb.com/?exploit_url.241116) with > privilege since the exploit requires it. > > [Potential Regression] > Expect very low regression potential. > > > Kyle Zeng (1): > ipv4: fix null-deref in ipv4_link_failure > > net/ipv4/route.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > Applied to lunar,jammy:linux/master-next. Thanks. -Stefan
On 19.10.23 00:49, Yuxuan Luo wrote: > [Impact] > A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. > The socket buffer (skb) was assumed to be associated with a device before > calling __ip_options_compile, which is not always the case if the skb is > re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN > privileges to crash the system. > > [Backport] > It's a clean backport. > > [Test] > Tested against [the poc](https://vuldb.com/?exploit_url.241116) with > privilege since the exploit requires it. > > [Potential Regression] > Expect very low regression potential. > > > Kyle Zeng (1): > ipv4: fix null-deref in ipv4_link_failure > > net/ipv4/route.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > Applied to mantic,focal:linux/master-next. Thanks. -Stefan