We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: vsock: fix recursive ->recvmsg calls After a vsock socket has been added to a BPF sockmap, its prot->recvmsg has been replaced with vsock_bpf_recvmsg(). Thus the following recursiion could happen: vsock_bpf_recvmsg() -> __vsock_recvmsg() -> vsock_connectible_recvmsg() -> prot->recvmsg() -> vsock_bpf_recvmsg() again We need to fix it by calling the original ->recvmsg() without any BPF sockmap logic in __vsock_recvmsg().
Reserved 2024-08-21 | Published 2024-09-04 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/921f1acf0c3cf6b1260ab57a8a6e8b3d5f3023d5
git.kernel.org/...c/b4ee8cf1acc5018ed1369150d7bb3e0d0f79e135
git.kernel.org/...c/69139d2919dd4aa9a553c8245e7c63e82613e3fc
Support options