HomeDefault status
unaffected
4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before 0393f85c3241c19ba8550f04a812e7d19f6b3082
affected
4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before 11709573cc4e48dc34c80fc7ab9ce5b159e29695
affected
Default status
affected
4.13
affected
Any version before 4.13
unaffected
6.17.3 (semver)
unaffected
6.18 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_output() Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent possible UAF. We can remove rcu_read_lock()/rcu_read_unlock() pairs from ip6_finish_output2().
Product status
4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before 0393f85c3241c19ba8550f04a812e7d19f6b3082
4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before 11709573cc4e48dc34c80fc7ab9ce5b159e29695
4.13
Any version before 4.13
6.17.3 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/0393f85c3241c19ba8550f04a812e7d19f6b3082
git.kernel.org/...c/11709573cc4e48dc34c80fc7ab9ce5b159e29695