[Zesty][PATCH 0/2] UBUNTU: SAUCE: net sched actions: access to uninitialized data and error handling

Fabian Gr├╝nbichler f.gruenbichler at proxmox.com
Thu Apr 13 16:12:09 UTC 2017

> Colin Ian King <colin.king at canonical.com> hat am 13. April 2017 um 15:16 geschrieben:
> I'll be happy to re-review these once these land upstream and we have an
> upstream commit id to work against.
> Colin

Might make sense to revert the buggy commit(s) until then? It's pretty easy to reliably trigger crashing / hanging kernel tasks at the moment, all it takes is the possibility to add a basic filter to a virtual net device (so it might be possible in restricted environments like containers as well..).

The original LP entry for which the backport from 4.11 happened is tagged with a CVE, but it's not obvious to me how that commit and the referenced CVE ID are related?

More information about the kernel-team mailing list