Description
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Make it so that a waiting process can be aborted When sendmsg() creates an rxrpc call, it queues it to wait for a connection and channel to be assigned and then waits before it can start shovelling data as the encrypted DATA packet content includes a summary of the connection parameters. However, sendmsg() may get interrupted before a connection gets assigned and further sendmsg() calls will fail with EBUSY until an assignment is made. Fix this so that the call can at least be aborted without failing on EBUSY. We have to be careful here as sendmsg() mustn't be allowed to start the call timer if the call doesn't yet have a connection assigned as an oops may follow shortly thereafter.
Product status
540b1c48c37ac0ad66212004db21e1ff7e2d78be (git) before 7161cf61c64e9e9413d790f2fa2b9dada71a2249
540b1c48c37ac0ad66212004db21e1ff7e2d78be (git) before 876d96faacbc407daf4978d7ec95051b68f5344a
540b1c48c37ac0ad66212004db21e1ff7e2d78be (git) before 0eb362d254814ce04848730bf32e75b8ee1a4d6c
4.11
Any version before 4.11
6.2.16 (semver)
6.3.3 (semver)
6.4 (original_commit_for_fix)
References
git.kernel.org/...c/7161cf61c64e9e9413d790f2fa2b9dada71a2249
git.kernel.org/...c/876d96faacbc407daf4978d7ec95051b68f5344a
git.kernel.org/...c/0eb362d254814ce04848730bf32e75b8ee1a4d6c