[SRU][Bionic][Cosmic][PATCH 0/1] Fix for CVE-2018-15471
Kleber Sacilotto de Souza
kleber.souza at canonical.com
Fri Oct 19 09:46:03 UTC 2018
https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-15471.html
An issue was discovered in xenvif_set_hash_mapping in
drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used
in Xen through 4.11.x and other products. The Linux netback driver allows
frontends to control mapping of requests to request queues. When processing
a request to set or change this mapping, some input validation (e.g., for
an integer overflow) was missing or flawed, leading to OOB access in hash
handling. A malicious or buggy frontend may cause the (usually privileged)
backend to make out of bounds memory accesses, potentially resulting in one
or more of privilege escalation, Denial of Service (DoS), or information
leaks.
Clean cherry-pick for Bionic and Cosmic. The patch was CC'ed to @stable
and applied on v4.18.14 but I'm sending to Cosmic as well in case we
don't catch up with upstream stable before its first SRU.
Jan Beulich (1):
xen-netback: fix input validation in xenvif_set_hash_mapping()
drivers/net/xen-netback/hash.c | 12 +++++++-----
1 file changed, 7 insertions(+), 5 deletions(-)
--
2.17.1
More information about the kernel-team
mailing list