Description: Guest can force Linux netback driver to hog large amounts of kernel memory References: https://xenbits.xen.org/xsa/advisory-392.html https://xenbits.xen.org/xsa/xsa392-linux-2.patch Notes: carnil> Commit fixes f48da8b14d04 ("xen-netback: fix unlimited guest Rx carnil> internal queue and carrier flapping"). carnil> For 5.15.y fixed as well in 5.15.11. Bugs: upstream: released (5.16-rc7) [be81992f9086b230623ae3ebbc85ecee4d00a3d3] 5.10-upstream-stable: released (5.10.88) [88f20cccbeec9a5e83621df5cc2453b5081454dc] 4.19-upstream-stable: released (4.19.222) [c9f17e92917fd5786be872626a3928979ecc4c39] 4.9-upstream-stable: released (4.9.294) [b4226b387436315e7f57465c15335f4f4b5b075d] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) 4.9-stretch-security: released (4.9.303-1)