-
Bug
-
Resolution: Done-Errata
-
Critical
-
rhel-9.5
-
None
-
passt-0^20240806.gee36266-2.el9
-
No
-
Important
-
rhel-sst-virtualization-networking
-
ssg_virtualization
-
None
-
False
-
-
None
-
None
-
None
See the user report at: https://archives.passt.top/passt-user/ZrxRFvQvzsqHdmfn@zatzit.fritz.box/
Long story short: if a process manages to send a packet to TCP port 0, which shouldn't be allowed (but Linux doesn't seem to drop), we crash.
I don't think it's necessarily security-relevant because the guest/container can anyway kill its own connectivity, and there would be nothing else gained from doing this, but this looks pretty annoying and I would rather fix it anyway.
- is cloned by
-
RHEL-54269 Backport upstream commit 61c0b0d0f199 ("flow: Don't crash if guest attempts to connect to port 0")
- Release Pending
- links to
-
RHBA-2024:133650 passt bug fix and enhancement update