ACK: [SRU Groovy,Hirsute,Focal/linux-oem-5.10 0/1] CVE-2021-31440
Tim Gardner
tim.gardner at canonical.com
Tue May 25 19:14:15 UTC 2021
Acked-by: Tim Gardner <tim.gardner at canonical.com>
On 5/24/21 4:56 PM, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A unprivileged user can load a BPF program that allows OOB reads and
> writes, potentially leading to privilege escalation.
>
> [Potential regression]
> Some BPF programs could fail to load.
>
> [Test case]
> I managed to get a soft lockup with a reproducer. After the fix, the
> program finishes as expected.
>
> Daniel Borkmann (1):
> bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds
>
> kernel/bpf/verifier.c | 8 +++-----
> tools/testing/selftests/bpf/verifier/array_access.c | 2 +-
> 2 files changed, 4 insertions(+), 6 deletions(-)
>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list