** Description changed: https://www.openwall.com/lists/oss-security/2021/02/04/5 The following mainline patch is required for >= groovy: [linux] c518adafa39f vsock: fix the race conditions in multi-transport support [linux-5.10-y] 55d900415b81 vsock: fix the race conditions in multi-transport support + + + [Impact] + + * Patches an exploitable vulnerability. + + [Test Case] + + * See disclosure article. + + [Regression Potential] + + * Low: straightforward race condition fix; upstream cherry-pick.
** Description changed: https://www.openwall.com/lists/oss-security/2021/02/04/5 The following mainline patch is required for >= groovy: [linux] c518adafa39f vsock: fix the race conditions in multi-transport support [linux-5.10-y] 55d900415b81 vsock: fix the race conditions in multi-transport support - [Impact] - * Patches an exploitable vulnerability. + * Patches an exploitable vulnerability. [Test Case] - * See disclosure article. + * See disclosure article. [Regression Potential] - * Low: straightforward race condition fix; upstream cherry-pick. + * Low: straightforward race condition fix; upstream cherry-pick. ** Description changed: https://www.openwall.com/lists/oss-security/2021/02/04/5 - The following mainline patch is required for >= groovy: + The following mainline patch is required for all kernels >= v5.8: {focal + hwe-5.8, groovy, hirsute}: - [linux] c518adafa39f vsock: fix the race conditions in multi-transport support - [linux-5.10-y] 55d900415b81 vsock: fix the race conditions in multi-transport support + [linux] c518adafa39f vsock: fix the race conditions in multi-transport + support + + or [linux-5.10-y] 55d900415b81 vsock: fix the race conditions in multi- + transport support + [Impact] * Patches an exploitable vulnerability. [Test Case] * See disclosure article. [Regression Potential] * Low: straightforward race condition fix; upstream cherry-pick. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1914668 Title: Exploitable vulnerabilities in AF_VSOCK implementation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1914668/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
