APPLIED: [SRU Bionic 0/1] CVE-2021-33200

Stefan Bader stefan.bader at canonical.com
Thu Jun 24 09:01:23 UTC 2021


On 24.06.21 02:14, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Unprivileged users can use eBPF to do an out-of-bounds read or write, which
> allow code execution, and privilege escalation.
> 
> [Test case]
> Ran a PoC that demonstrated the out-of-bounds read by leaking a kernel address.
> 
> [Potential regression]
> Some eBPF code might fail to load.
> 
> Daniel Borkmann (1):
>    bpf: Fix mask direction swap upon off reg sign change
> 
>   kernel/bpf/verifier.c | 22 ++++++++++++----------
>   1 file changed, 12 insertions(+), 10 deletions(-)
> 
Applied to bionic:linux/master-prep. Thanks.

-Stefan


-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20210624/49a6e34d/attachment.sig>


More information about the kernel-team mailing list