ACK: [SRU Xenial 0/1] CVE-2021-29154
Colin Ian King
colin.king at canonical.com
Fri Apr 9 20:59:54 UTC 2021
On 09/04/2021 20:47, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
>
> See https://www.openwall.com/lists/oss-security/2021/04/08/1.
>
> [Test case]
>
> Ran LTP bpf tests and test_kmod.sh from kselftests, that use the test_bpf
> module.
>
> [Regression potential]
>
> Some BPF code might fail to load and this might prevent seccomp, systemd, etc,
> from correctly running services, so boot may fail and safeguards might not run.
>
>
> Piotr Krysiuk (1):
> UBUNTU: SAUCE: bpf, x86: Validate computation of branch displacements
> for x86-64
>
> arch/x86/net/bpf_jit_comp.c | 13 +++++++++++--
> 1 file changed, 11 insertions(+), 2 deletions(-)
>
Looks good to me - and I've eyeballed this in action with various
instrumented test cases too.
Thanks Thadeu.
Acked-by: Colin Ian King <colin.king at canonical.com>
More information about the kernel-team
mailing list