APPLIED: [SRU Bionic 0/1] CVE-2021-33200
Stefan Bader
stefan.bader at canonical.com
Thu Jun 24 09:01:23 UTC 2021
On 24.06.21 02:14, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Unprivileged users can use eBPF to do an out-of-bounds read or write, which
> allow code execution, and privilege escalation.
>
> [Test case]
> Ran a PoC that demonstrated the out-of-bounds read by leaking a kernel address.
>
> [Potential regression]
> Some eBPF code might fail to load.
>
> Daniel Borkmann (1):
> bpf: Fix mask direction swap upon off reg sign change
>
> kernel/bpf/verifier.c | 22 ++++++++++++----------
> 1 file changed, 12 insertions(+), 10 deletions(-)
>
Applied to bionic:linux/master-prep. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20210624/49a6e34d/attachment.sig>
More information about the kernel-team
mailing list