APPLIED: [CVE-2016-9793][trysty, vivid, xenial, yakkety] net: avoid signed overflows for SO_{SND|RCV}BUFFORCE

Steve Beattie steve.beattie at canonical.com
Tue Dec 27 06:40:23 UTC 2016


On Tue, Dec 27, 2016 at 12:40:36PM +0800, Po-Hsu Lin wrote:
> Kernel security test for this CVE still fail on T/V/X/Y (and Z)
> proposed kernels even with this patch applied.
> Public bug filed: http://pad.lv/1652242

Thanks, the test for this was incorrect. I've now corrected the test in
the qa-regression-testing tree.

-- 
Steve Beattie
<sbeattie at ubuntu.com>
http://NxNW.org/~steve/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20161226/242f102d/attachment.sig>


More information about the kernel-team mailing list