APPLIED[G]/NAK[H]/cmnt: [SRU Groovy, Hirsute, Focal/linux-oem-5.10 0/1] CVE-2021-31440

Kleber Souza kleber.souza at canonical.com
Wed May 26 13:23:22 UTC 2021


On 25.05.21 00:56, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A unprivileged user can load a BPF program that allows OOB reads and
> writes, potentially leading to privilege escalation.
> 
> [Potential regression]
> Some BPF programs could fail to load.
> 
> [Test case]
> I managed to get a soft lockup with a reproducer. After the fix, the
> program finishes as expected.
> 
> Daniel Borkmann (1):
>    bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds
> 
>   kernel/bpf/verifier.c                               | 8 +++-----
>   tools/testing/selftests/bpf/verifier/array_access.c | 2 +-
>   2 files changed, 4 insertions(+), 6 deletions(-)
> 

Applied to groovy:linux.

Already applied to hirsute:linux via upstream stable (LP: #1929455).

Thanks,
Kleber




More information about the kernel-team mailing list