From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.0 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 18277C43381 for ; Thu, 14 Feb 2019 10:31:24 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D18722229F for ; Thu, 14 Feb 2019 10:31:23 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="peUDrHiz" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387947AbfBNKbX (ORCPT ); Thu, 14 Feb 2019 05:31:23 -0500 Received: from mail-ed1-f51.google.com ([209.85.208.51]:33918 "EHLO mail-ed1-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388383AbfBNKbX (ORCPT ); Thu, 14 Feb 2019 05:31:23 -0500 Received: by mail-ed1-f51.google.com with SMTP id b3so4609678ede.1 for ; Thu, 14 Feb 2019 02:31:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id; bh=i5IkbNXIDsByWk4/jzuM9ciQO0b3DTqB3PKPJ/WQ3Wg=; b=peUDrHizrtCxt26w1rpKM5Jq+fTw4gzZr9XA2euKYpOiDULJLNdWluggBaqY1UC7tQ FjkKfnZ3O2Tz+lltU6IYZupEv2epJ1J/xmLEZ5jvV9MSWDjyYzZogxzariseKsao8To/ EugNCbgmB9Z5FWnSfdJbWSqv8d93EA8rSb/gUv/pBk1i8ATYMFukPGa6porECI/UC9BP zr8qew6wtJNw8SOYsYQqIBt1nSCHkD+h13OsKRB4GkZlgp2Uiq+/UmxqaRBizPiNi2OG JFFpLhWd1Ka9b9OcNihxWyt3UzIahtCKhG7onfplrYUqT+G1xfdzX0uz4AGhEAsmJS+r 6YQQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id; bh=i5IkbNXIDsByWk4/jzuM9ciQO0b3DTqB3PKPJ/WQ3Wg=; b=ft2W91klhGFuQFoYwMQ0vWpkWfmnflJNIGHhB+rGrgGgQF+NG0caASFNjnjb5G5PRe X9S8SEl28na/u/wOi9Vl6cI7U3zHWfphn2cFHwok1qd+iMxzuz5QtoXNpJjIatDqB8DR ma9IblGRHk8+xwHms38DYcMoVWj7BgxACHhcgqqZ//m2WzjaggoUdlm5V35H6NHPFwTZ +YeYnS6NoDugQFcyOVDZCqxMWkchwlJJBzu0MEh7o4JAA4ziWwzOx2MV+zj8wL5penPh d/qOGaiiNyUczEhppTOQ80XI7VlUzewgnM5yh9YGktAmgNJpn0sBfcr6lFntp8R2Unoh 1koQ== X-Gm-Message-State: AHQUAua42MkLzqlyz/9UdpX8iTyjAvZp7RDmDODb8+LwWQqAn2Pytmhx NxxwYJSKcixtcQ5go+Hm3Pew3XXw X-Google-Smtp-Source: AHgI3IaSGJs4+nR0Eh+LK9PybO7Tv2h25qJtOV8lpoEgnmXMtDMoZhh16i42Nhq/yKJp8LH4YRQRrg== X-Received: by 2002:a17:906:69cf:: with SMTP id g15mr2248451ejs.104.1550140281343; Thu, 14 Feb 2019 02:31:21 -0800 (PST) Received: from jwang-pc.pb.local ([2001:1438:4010:254c:1e6f:65ff:fed4:d10]) by smtp.gmail.com with ESMTPSA id p30sm543052edd.85.2019.02.14.02.31.20 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 14 Feb 2019 02:31:20 -0800 (PST) From: Jack Wang To: gregkh@linuxfoundation.org, stable@vger.kernel.org Subject: [stable-4.9 && 4.14 0/2] CVE 2018-1000026 fixes Date: Thu, 14 Feb 2019 11:31:16 +0100 Message-Id: <20190214103118.4350-1-jinpuwang@gmail.com> X-Mailer: git-send-email 2.17.1 Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Hi Greg, This is clean cherry-pick from upstream 4.16 for CVE 2018-1000026 Other OS vendors have the fixes in their kernels[1][2], but not yet in upstream stable tree for 4.9 and 4.14. Compile tested with 4.14.93. Please consider to include them. Thanks, Jack Wang Linux Kernel Developer @ 1&1 IONOS Cloud GmbH [1] https://bugs.launchpad.net/bugs/cve/2018-1000026 [2] https://access.redhat.com/security/cve/cve-2018-1000026 Daniel Axtens (2): net: create skb_gso_validate_mac_len() bnx2x: disable GSO where gso_size is too big for hardware .../net/ethernet/broadcom/bnx2x/bnx2x_main.c | 18 ++++++ include/linux/skbuff.h | 16 +++++ net/core/skbuff.c | 63 +++++++++++++++---- net/sched/sch_tbf.c | 10 --- 4 files changed, 84 insertions(+), 23 deletions(-) -- 2.17.1