<div dir="ltr"><div>Applied to focal,jammy,kinetic,lunar linux master-next <br></div><div><br></div><div>Thanks, <br></div><div>- Luke<br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, May 11, 2023 at 12:09 AM Yuxuan Luo <<a href="mailto:yuxuan.luo@canonical.com">yuxuan.luo@canonical.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">[Impact]<br>
When the MTU of the loopback device feeds a large number, net/sched/sch_qfq.c<br>
allows a out-of-bounds read/write error, detriment system's integrity.<br>
<br>
[Backport]<br>
It is a clean cherry pick for all affected releases.<br>
<br>
[Test]<br>
Compile and smoke tested via modprobe and rmmod the sch_fq module.<br>
<br>
[Potential Regression]<br>
Expecting little regression potential since the patch only adds an additional<br>
layer of checking without manipulating the memory.<br>
<br>
Gwangun Jung (1):<br>
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg<br>
<br>
net/sched/sch_qfq.c | 13 +++++++------<br>
1 file changed, 7 insertions(+), 6 deletions(-)<br>
<br>
-- <br>
2.34.1<br>
<br>
<br>
-- <br>
kernel-team mailing list<br>
<a href="mailto:kernel-team@lists.ubuntu.com" target="_blank">kernel-team@lists.ubuntu.com</a><br>
<a href="https://lists.ubuntu.com/mailman/listinfo/kernel-team" rel="noreferrer" target="_blank">https://lists.ubuntu.com/mailman/listinfo/kernel-team</a><br>
</blockquote></div></div>