APPLIED: [CVE-2016-9793][trysty, vivid, xenial, yakkety] net: avoid signed overflows for SO_{SND|RCV}BUFFORCE

Steve Beattie steve.beattie at
Tue Dec 27 06:40:23 UTC 2016

On Tue, Dec 27, 2016 at 12:40:36PM +0800, Po-Hsu Lin wrote:
> Kernel security test for this CVE still fail on T/V/X/Y (and Z)
> proposed kernels even with this patch applied.
> Public bug filed:

Thanks, the test for this was incorrect. I've now corrected the test in
the qa-regression-testing tree.

Steve Beattie
<sbeattie at>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <>

More information about the kernel-team mailing list