"value":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent UAF in ip6_send_skb()\n\nsyzbot reported an UAF in ip6_send_skb() [1]\n\nAfter ip6_local_out() has returned, we no longer can safely\ndereference rt, unless we hold rcu_read_lock().\n\nA similar issue has been fixed in commit\na688caa34beb (\"ipv6: take rcu lock in rawv6_send_hdrinc()\")\n\nAnotherpotentialissueinip6_finish_output2()ishandledina\nseparatepatch.\n\n[1]\nBUG:KASAN:slab-use-after-freeinip6_send_skb+0x18d/0x230net/ipv6/ip6_output.c:1964\nReadofsize8ataddrffff88806dde4858bytasksyz.1.380/6530\n\nCPU:1UID:0PID:6530Comm:syz.1.380Nottainted6.11.0-rc3-syzkaller-00306-gdf6cbc62cc9b#0\nHardwarename:GoogleGoogleComputeEngine/GoogleComputeEngine,BIOSGoogle08/06/2024\nCallTrace:\n<TASK>\n__dump_stacklib/dump_stack.c:93[inline]\ndump_stack_lvl+0x241/0x360lib/dump_stack.c:119\nprint_address_descriptionmm/kasan/report.c:377[inline]\nprint_report+0x169/0x550mm/kasan/report.c:488\nkasan_report+0x143/0x180mm/kasan/report.c:601\nip6_send_skb+0x18d/0x230net/ipv6/ip6_output.c:1964\nrawv6_push_pending_frames+0x75c/0x9e0net/ipv6/raw.c:588\nrawv6_sendmsg+0x19c7/0x23c0net/ipv6/raw.c:926\nsock_sendmsg_nosecnet/socket.c:730[inline]\n__sock_sendmsg+0x1a6/0x270net/socket.c:745\nsock_write_iter+0x2dd/0x400net/socket.c:1160\ndo_iter_readv_writev+0x60a/0x890\nvfs_writev+0x37c/0xbb0fs/read_write.c:971\ndo_writev+0x1b1/0x350fs/read_write.c:1018\ndo_syscall_x64arch/x86/entry/common.c:52[inline]\ndo_syscall_64+0xf3/0x230arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP:0033:0x7f936bf79e79\nCode:ffffc3662e0f1f8400000000000f1f40004889f84889f74889d64889ca4d89c24d89c84c8b4c24080f05<48>3d01f0ffff7301c348c7c1a8fffffff7d864890148\nRSP:002b:00007f936cd7f038EFLAGS:00000246ORIG_RAX:0000000000000014\nRAX:ffffffffffffffdaRBX:00007f936c115f80RCX:00007f936bf79e79\nRDX:0000000000000001RSI:0000000020000040RDI:0000000000000004\nRBP:00007f936bfe7916R08:0000000000000000R09:0000000000000000\nR10:0000000000000000R11:0000000000000246R12:0000000000000000\nR13:0000000000000000R14:00007f936c115f80R15:00007fff2860a7a8\n</TASK>\n\nAllocatedbytask6530:\nkasan_save_stackmm/kasan/common.c:47[inline]\nkasan_save_track+0x3f/0x80mm/kasan/common.c:68\nunpoison_slab_objectmm/kasan/common.c:312[inline]\n__kasan_slab_alloc+0x66/0x80mm/kasan/common.c:338\nkasan_slab_allocinclude/linux/kasan.h:201[inline]\nslab_post_alloc_hookmm/slub.c:3988[inline]\nslab_alloc_nodemm/slub.c:4037[inline]\nkmem_cache_alloc_noprof+0x135/0x2a0mm/slub.c:4044\ndst_alloc+0x12b/0x190net/core/dst.c:89\nip6_blackhole_route+0x59/0x340net/ipv6/route.c:2670\nmake_blackholenet/xfrm/xfrm_policy.c:3120[inline]\nxfrm_lookup_route+0xd1/0x1c0net/xfrm/xfrm_policy.c:3313\nip6_dst_lookup_flow+0x13e/0x180net/ipv6/ip6_output.c:1257\nrawv6_sendmsg+0x1283/0x23c0net/ipv6/raw.c:898\nsock_sendmsg_nosecnet/socket.c:730[inline]\n__sock_sendmsg+0x1a6/0x270net/socket.c:745\n____sys_sendmsg+0x525/0x7d0net/socket.c:2597\n___sys_sendmsgnet/socket.c:2651[inline]\n__sys_sendmsg+0x2b0/0x3a0net/socket.c:2680\ndo_syscall_x64arch/x86/entry/common.c:52[inline]\ndo_syscall_64+0xf3/0x230arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreedbytask45:\nkasan_save_stackmm/kasan/common.c:47[inline]\nkasan_save_track+0x3f/0x80mm/kasan/common.c:68\nkasan_save_free_info+0x40/0x50mm/kasan/generic.c:579\npoison_slab_object+0xe0/0x150mm/kasan/common.c:240\n__kasan_slab_free+0x37/0x60mm/kasan/common.c:256\nkasan_slab_freeinclude/linux/kasan.h:184[inline]\nslab_free_hookmm/slub.c:2252[inline]\nslab_freemm/slub.c:4473[inline]\nkmem_cache_free+0x145/0x350mm/slub.c:4548\ndst_destroy+0x2ac/0x460net/core/dst.c:124\nrcu_do_batchkernel/rcu/tree.c:2569[inline]\nrcu_core+0xafd/0x1830kernel/rcu/tree.\n---trun