APPLIED/Cmnt[K/J/F/B]: [SRU Bionic, Focal, Jammy, Kinetic, OEM-5.17, OEM-6.0, OEM-6.1 0/2] CVE-2023-1829

Stefan Bader stefan.bader at canonical.com
Fri Apr 14 09:27:20 UTC 2023


On 13.04.23 23:11, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> tcindex classifier has been the target of multiple syzkaller reports,
> leading to vulnerabilities being exploited to cause crash or potential
> code execution.
> 
> [Fix]
> The driver has been removed upstream including on LTS kernels.
> 
> [Potential regression]
> Any users relying on tcindex will have to resort to a different classifier.
> 
> Jamal Hadi Salim (1):
>    net/sched: Retire tcindex classifier
> 
> Thadeu Lima de Souza Cascardo (1):
>    UBUNTU: [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available
> 

Applied to kinetic,jammy,focal,bionic:linux/master-next. Thanks.

Notes: Kinettic patch #1 did not apply. The conflict was the removal of 
cls_tcindex.c which I just manually did and used the fixed up change. 
Same thing happened on Jammy, Focal, and Bionic. Somehow it feels like 
something consistently goes wrong when backporting a file removal.
On Focal and Bionic I also had to adjust the abi version in the second 
patch.  So note that for 2023.03.20 we have Focal 5.4.0-147.164 and 
Bionic 4.15.0-209.220.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230414/0b955094/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230414/0b955094/attachment-0001.sig>


More information about the kernel-team mailing list