ACK: [SRU Xenial 0/1] CVE-2021-29154

Colin Ian King colin.king at canonical.com
Fri Apr 9 20:59:54 UTC 2021


On 09/04/2021 20:47, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> 
> See https://www.openwall.com/lists/oss-security/2021/04/08/1.
> 
> [Test case]
> 
> Ran LTP bpf tests and test_kmod.sh from kselftests, that use the test_bpf
> module.
> 
> [Regression potential]
> 
> Some BPF code might fail to load and this might prevent seccomp, systemd, etc,
> from correctly running services, so boot may fail and safeguards might not run.
> 
> 
> Piotr Krysiuk (1):
>   UBUNTU: SAUCE: bpf, x86: Validate computation of branch displacements
>     for x86-64
> 
>  arch/x86/net/bpf_jit_comp.c | 13 +++++++++++--
>  1 file changed, 11 insertions(+), 2 deletions(-)
> 

Looks good to me - and I've eyeballed this in action with various
instrumented test cases too.

Thanks Thadeu.

Acked-by: Colin Ian King <colin.king at canonical.com>



More information about the kernel-team mailing list