Backport RXRPC for 6.1.y from 6.2
Jeffrey E Altman
jaltman at auristor.com
Sun May 10 11:04:01 PDT 2026
On 5/10/2026 1:41 PM, Wentao Guan wrote:
>> Are you associated with a Linux distribution which ships 6.1.y stable?
> We shiped 6.1 kernel past, and we are preparing the fix for it.
>
> BRs
> Wentao Guan
Wentao,
Have you confirmed that 6.1.179 is vulnerable to the exploit? When
processing
a DATA packet a new unshared skb is allocated for the incoming packet
whenever decryption is required.
/* Unshare the packet so that it can be modified for in-place
* decryption.
*/
if (sp->hdr.securityIndex != 0) {
struct sk_buff *nskb = skb_unshare(skb, GFP_ATOMIC);
if (!nskb) {
rxrpc_eaten_skb(skb, rxrpc_skb_unshared_nomem);
goto out;
}
if (nskb != skb) {
rxrpc_eaten_skb(skb, rxrpc_skb_received);
skb = nskb;
rxrpc_new_skb(skb, rxrpc_skb_unshared);
sp = rxrpc_skb(skb);
}
}
I cannot easily check but it doesn't look like 6.1.179 is vulnerable to
CVE-2026-43500.
Please check.
Thank you.
Jeffrey Altman
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4467 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.infradead.org/pipermail/linux-afs/attachments/20260510/77772fdc/attachment-0001.p7s>
More information about the linux-afs
mailing list