In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload. Protect new_transport from becoming a stale pointer. This also takes care of an insecure call in vsock_use_local_transport(); add a lockdep assert. BUG: unable to handle page fault for address: fffffbfff8056000 Oops: Oops: 0000 [#1] SMP KASAN RIP: 0010:vsock_assign_transport+0x366/0x600 Call Trace: vsock_connect+0x59c/0xc40 __sys_connect+0xe8/0x100 __x64_sys_connect+0x6e/0xc0 do_syscall_64+0x92/0x1c0 entry_SYSCALL_64_after_hwframe+0x4b/0x53
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | < 5.15.70 |
| Linux | Linux | < 6cb6b12b78dcd8867a3fdbb1b6d0ed1df2b208d1 |
| Linux | Linux | Cumulative Update 22 |
| Linux | Linux | 7.8.22 |