In the Linux kernel, the following vulnerability has been...
Unreviewed
Published
Jan 19, 2025
to the GitHub Advisory Database
•
Updated Jan 23, 2025
Description
Published by the National Vulnerability Database
Jan 19, 2025
Published to the GitHub Advisory Database
Jan 19, 2025
Last updated
Jan 23, 2025
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: rto_min/max: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:
Inconsistency: getting info from the reader's/writer's netns vs only
from the opener's netns.
current->nsproxy can be NULL in some cases, resulting in an 'Oops'
(null-ptr-deref), e.g. when the current task is exiting, as spotted by
syzbot [1] using acct(2).
The 'net' structure can be obtained from the table->data using
container_of().
Note that table->data could also be used directly, as this is the only
member needed from the 'net' structure, but that would increase the size
of this fix, to use '*data' everywhere 'net->sctp.rto_min/max' is used.
References