l2tp fails to grab the lock when modifying the underlying tunnel socket, possibly leading to a NULL pointer dereference and denial of service. Upstream patch: https://lore.kernel.org/all/20220823101459.211986-1-jakub@cloudflare.com/t [v3] https://lore.kernel.org/all/20220815130107.149345-1-jakub@cloudflare.com/t [v2] https://lore.kernel.org/all/20220810102848.282778-1-jakub@cloudflare.com/t [v1]
In reply to comment #0: > l2tp fails to grab the lock when modifying the underlying tunnel socket, > possibly leading to a NULL pointer dereference and denial of service. > > Upstream patch: > https://lore.kernel.org/all/20220823101459.211986-1-jakub@cloudflare.com/t [v3] New version: https://lore.kernel.org/all/20221114191619.124659-1-jakub@cloudflare.com/t [v4] Note that the above patch does not entirely solve the issue, see follow up: https://lore.kernel.org/netdev/20221121085426.21315-1-jakub@cloudflare.com/t [v2] https://lore.kernel.org/netdev/20221119130317.39158-1-jakub@cloudflare.com/t [v1]
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2145237]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2148 https://access.redhat.com/errata/RHSA-2023:2148
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2458 https://access.redhat.com/errata/RHSA-2023:2458
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2736 https://access.redhat.com/errata/RHSA-2023:2736
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2951 https://access.redhat.com/errata/RHSA-2023:2951
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-4129
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0412