Description: net/packet: fix overflow in tpacket_rcv References: https://www.openwall.com/lists/oss-security/2020/09/03/3 https://www.openwall.com/lists/oss-security/2020/09/04/2 https://lore.kernel.org/netdev/CAM6JnLf_8nwzq+UGO+amXpeApCDarJjwzOEHQd5qBhU7YKm3DQ@mail.gmail.com/ https://lore.kernel.org/netdev/20200904040528.3635711-1-edumazet@google.com/ Notes: carnil> To create AF_PACKET sockets one needs CAP_NET_RAW in the carnil> network namepsace, which could be aquired by unprivileged carnil> processes on systems where unprivileged namespaces are enabled. carnil> Debian does not enable those. Bugs: upstream: released (5.9-rc4) [acf69c946233259ab4d64f8869d4037a198c7f06] 4.19-upstream-stable: released (4.19.150) [1c3886dc302329f199cc04f8a56ba44d17a0df16] 4.9-upstream-stable: released (4.9.239) [9a675ac9fe9794f0981db6e4b101503818f61622] sid: released (5.8.7-1) [bugfix/all/net-packet-fix-overflow-in-tpacket_rcv.patch] 4.19-buster-security: released (4.19.146-1) [bugfix/all/net-packet-fix-overflow-in-tpacket_rcv.patch] 4.9-stretch-security: released (4.9.240-1)