On Thu, Feb 21, 2019 at 11:18 AM Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
On Thu, Feb 21, 2019 at 10:38:16AM -0500, Willem de Bruijn wrote:
Unfortunately commit
net: validate untrusted gso packets without csum offload d5be7f632bad0f489879eed0ff4b99bd7fe0b74c
needs follow-up
net: avoid false positives in untrusted gso validation http://patchwork.ozlabs.org/patch/1044429/
It rejects illegal packets injected from userspace, including at least one that can crash the kernel. But I'm afraid it has false positives.
I would suggest holding back on the backport to stable branches until both patches can go in together.
If the second patch is not accepted, the alternative will be to revert this filter-based approach completely and fix the narrow kernel crash (but I'm afraid that syzkaller will just find others..)
Apologies for the mess,
Ok, I will go drop this patch from all of the stable queues. Can you remind me when your fixup hits Linus's tree so that I can queue up both patches?
Thanks Greg.
Okay, I'll reply to this thread with the follow-up commit SHA1.