We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: l2tp: close all race conditions in l2tp_tunnel_register() The code in l2tp_tunnel_register() is racy in several ways: 1. It modifies the tunnel socket _after_ publishing it. 2. It calls setup_udp_tunnel_sock() on an existing socket without locking. 3. It changes sock lock class on fly, which triggers many syzbot reports. This patch amends all of them by moving socket initialization code before publishing and under sock lock. As suggested by Jakub, the l2tp lockdep class is not necessary as we can just switch to bh_lock_sock_nested().
Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/2d77e5c0ad79004b5ef901895437e9cce6dfcc7e
git.kernel.org/...c/77e8ed776cdb1a24b2aab8fe7c6f1f154235e1ce
git.kernel.org/...c/cef0845b6dcfa2f6c2c832e7f9622551456c741d
git.kernel.org/...c/0b2c59720e65885a394a017d0cf9cab118914682
Support options