APPLIED [OEM-5.17, OEM-6.0] Re: [SRU][Jammy-OEM-5.17/OEM-6.0][PATCH 0/1] CVE-2023-31436

Timo Aaltonen tjaalton at ubuntu.com
Fri Aug 4 10:07:43 UTC 2023


Yuxuan Luo kirjoitti 31.7.2023 klo 22.26:
> [Impact]
> When the MTU of the loopback device feeds a large number, net/sched/sch_qfq.c
> allows a out-of-bounds read/write error, detriment system's integrity.
> 
> [Backport]
> It is a clean cherry pick.
> 
> [Test]
> Compile and smoke tested via modprobe and rmmod the sch_fq module.
> 
> [Potential Regression]
> Expecting little regression potential since the patch only adds an additional
> layer of checking without manipulating the memory.
> 
> Gwangun Jung (1):
>    net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
> 
>   net/sched/sch_qfq.c | 13 +++++++------
>   1 file changed, 7 insertions(+), 6 deletions(-)
> 

applied to oem-5.17, -6.0, thanks

-- 
t




More information about the kernel-team mailing list