Message ID | 20230927185403.112264-1-magali.lemes@canonical.com |
---|---|
Headers | show |
Series | CVE-2023-42755 | expand |
On 27/09/2023 20:53, Magali Lemes wrote: > [Impact] > A slab-out-of-bounds access in the RSVP traffic classifier may lead to a wild > pointer access and thus crash the kernel. > > [Backport] > All cherry-picks from stable trees so we can avoid conflicts. > > [Test] > Compile and boot tested. > > [Regression potential] > Users of RSVP traffic classifier would be affected by its removal. However, > this classifier is already retired upstream due to the lack of known users. > > Jamal Hadi Salim (1): > net/sched: Retire rsvp classifier > > Magali Lemes (1): > UBUNTU: [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6 > > .../abi/5.4.0-162.179/amd64/generic.modules | 2 - > .../5.4.0-162.179/amd64/lowlatency.modules | 2 - > .../abi/5.4.0-162.179/arm64/generic.modules | 2 - > .../5.4.0-162.179/armhf/generic-lpae.modules | 2 - > .../abi/5.4.0-162.179/armhf/generic.modules | 2 - > .../abi/5.4.0-162.179/ppc64el/generic.modules | 2 - > .../abi/5.4.0-162.179/s390x/generic.modules | 2 - > debian.master/config/annotations | 2 - > debian.master/config/config.common.ubuntu | 2 - > net/sched/Kconfig | 28 - > net/sched/Makefile | 2 - > net/sched/cls_rsvp.c | 24 - > net/sched/cls_rsvp.h | 777 ------------------ > net/sched/cls_rsvp6.c | 24 - > 14 files changed, 873 deletions(-) > delete mode 100644 net/sched/cls_rsvp.c > delete mode 100644 net/sched/cls_rsvp.h > delete mode 100644 net/sched/cls_rsvp6.c > Acked-by: Roxana Nicolescu <roxana.nicolescu@canonical.com>
Magali Lemes kirjoitti 27.9.2023 klo 21.53: > [Impact] > A slab-out-of-bounds access in the RSVP traffic classifier may lead to a wild > pointer access and thus crash the kernel. > > [Backport] > All cherry-picks from stable trees so we can avoid conflicts. > > [Test] > Compile and boot tested. > > [Regression potential] > Users of RSVP traffic classifier would be affected by its removal. However, > this classifier is already retired upstream due to the lack of known users. > > Jamal Hadi Salim (1): > net/sched: Retire rsvp classifier > > Magali Lemes (1): > UBUNTU: [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6 > > .../abi/5.4.0-162.179/amd64/generic.modules | 2 - > .../5.4.0-162.179/amd64/lowlatency.modules | 2 - > .../abi/5.4.0-162.179/arm64/generic.modules | 2 - > .../5.4.0-162.179/armhf/generic-lpae.modules | 2 - > .../abi/5.4.0-162.179/armhf/generic.modules | 2 - > .../abi/5.4.0-162.179/ppc64el/generic.modules | 2 - > .../abi/5.4.0-162.179/s390x/generic.modules | 2 - > debian.master/config/annotations | 2 - > debian.master/config/config.common.ubuntu | 2 - > net/sched/Kconfig | 28 - > net/sched/Makefile | 2 - > net/sched/cls_rsvp.c | 24 - > net/sched/cls_rsvp.h | 777 ------------------ > net/sched/cls_rsvp6.c | 24 - > 14 files changed, 873 deletions(-) > delete mode 100644 net/sched/cls_rsvp.c > delete mode 100644 net/sched/cls_rsvp.h > delete mode 100644 net/sched/cls_rsvp6.c > applied to oem-6.1, thanks
On 9/27/23 12:53 PM, Magali Lemes wrote: > [Impact] > A slab-out-of-bounds access in the RSVP traffic classifier may lead to a wild > pointer access and thus crash the kernel. > > [Backport] > All cherry-picks from stable trees so we can avoid conflicts. > > [Test] > Compile and boot tested. > > [Regression potential] > Users of RSVP traffic classifier would be affected by its removal. However, > this classifier is already retired upstream due to the lack of known users. > > Jamal Hadi Salim (1): > net/sched: Retire rsvp classifier > > Magali Lemes (1): > UBUNTU: [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6 > > .../abi/5.4.0-162.179/amd64/generic.modules | 2 - > .../5.4.0-162.179/amd64/lowlatency.modules | 2 - > .../abi/5.4.0-162.179/arm64/generic.modules | 2 - > .../5.4.0-162.179/armhf/generic-lpae.modules | 2 - > .../abi/5.4.0-162.179/armhf/generic.modules | 2 - > .../abi/5.4.0-162.179/ppc64el/generic.modules | 2 - > .../abi/5.4.0-162.179/s390x/generic.modules | 2 - > debian.master/config/annotations | 2 - > debian.master/config/config.common.ubuntu | 2 - > net/sched/Kconfig | 28 - > net/sched/Makefile | 2 - > net/sched/cls_rsvp.c | 24 - > net/sched/cls_rsvp.h | 777 ------------------ > net/sched/cls_rsvp6.c | 24 - > 14 files changed, 873 deletions(-) > delete mode 100644 net/sched/cls_rsvp.c > delete mode 100644 net/sched/cls_rsvp.h > delete mode 100644 net/sched/cls_rsvp6.c > Acked-by: Tim Gardner <tim.gardner@canonical.com>
On 27/09/2023 20:53, Magali Lemes wrote: > [Impact] > A slab-out-of-bounds access in the RSVP traffic classifier may lead to a wild > pointer access and thus crash the kernel. > > [Backport] > All cherry-picks from stable trees so we can avoid conflicts. > > [Test] > Compile and boot tested. > > [Regression potential] > Users of RSVP traffic classifier would be affected by its removal. However, > this classifier is already retired upstream due to the lack of known users. > > Jamal Hadi Salim (1): > net/sched: Retire rsvp classifier > > Magali Lemes (1): > UBUNTU: [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6 > > .../abi/5.4.0-162.179/amd64/generic.modules | 2 - > .../5.4.0-162.179/amd64/lowlatency.modules | 2 - > .../abi/5.4.0-162.179/arm64/generic.modules | 2 - > .../5.4.0-162.179/armhf/generic-lpae.modules | 2 - > .../abi/5.4.0-162.179/armhf/generic.modules | 2 - > .../abi/5.4.0-162.179/ppc64el/generic.modules | 2 - > .../abi/5.4.0-162.179/s390x/generic.modules | 2 - > debian.master/config/annotations | 2 - > debian.master/config/config.common.ubuntu | 2 - > net/sched/Kconfig | 28 - > net/sched/Makefile | 2 - > net/sched/cls_rsvp.c | 24 - > net/sched/cls_rsvp.h | 777 ------------------ > net/sched/cls_rsvp6.c | 24 - > 14 files changed, 873 deletions(-) > delete mode 100644 net/sched/cls_rsvp.c > delete mode 100644 net/sched/cls_rsvp.h > delete mode 100644 net/sched/cls_rsvp6.c > Applied to focal,jammy,lunar:master-next. Thanks! Roxana