ACK: [SRU Groovy,Hirsute,Focal/linux-oem-5.10 0/1] CVE-2021-31440

Tim Gardner tim.gardner at canonical.com
Tue May 25 19:14:15 UTC 2021


Acked-by: Tim Gardner <tim.gardner at canonical.com>

On 5/24/21 4:56 PM, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A unprivileged user can load a BPF program that allows OOB reads and
> writes, potentially leading to privilege escalation.
> 
> [Potential regression]
> Some BPF programs could fail to load.
> 
> [Test case]
> I managed to get a soft lockup with a reproducer. After the fix, the
> program finishes as expected.
> 
> Daniel Borkmann (1):
>    bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds
> 
>   kernel/bpf/verifier.c                               | 8 +++-----
>   tools/testing/selftests/bpf/verifier/array_access.c | 2 +-
>   2 files changed, 4 insertions(+), 6 deletions(-)
> 

-- 
-----------
Tim Gardner
Canonical, Inc



More information about the kernel-team mailing list