APPLIED: [SRU HWE-5.17 0/1] CVE-2022-33743
Stefan Bader
stefan.bader at canonical.com
Fri Nov 11 11:57:44 UTC 2022
On 12.10.22 04:17, Cengiz Can wrote:
> [Impact]
> network backend may cause Linux netfront to use freed SKBs While adding
> logic to support XDP (eXpress Data Path), a code label was moved in a
> way allowing for SKBs having references (pointers) retained for further
> processing to nevertheless be freed.
>
> [Fix]
> Patch was initially sent to oss-sec mailing list as an attachment.
>
> It landed to upstream with v5.19-rc6.
> The problematic label seems to be in correct place for xenial, bionic
> and focal. jammy and kinetic already has the fix.
>
> [Test case]
> Compile and boot tested only.
>
> [Potential regression]
> Medium potential. Fix is moving an existing __skb_queue_tail call to be
> executed on every iteration of a for loop.
>
> Jan Beulich (1):
> xen-netfront: restore __skb_queue_tail() positioning in
> xennet_get_responses()
>
> drivers/net/xen-netfront.c | 4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
Applied to jammy:linux-hwe-5.17/hwe-5.17-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221111/c85d1421/attachment.sig>
More information about the kernel-team
mailing list