APPLIED[G]/NAK[H]/cmnt: [SRU Groovy, Hirsute, Focal/linux-oem-5.10 0/1] CVE-2021-31440
Kleber Souza
kleber.souza at canonical.com
Wed May 26 13:23:22 UTC 2021
On 25.05.21 00:56, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A unprivileged user can load a BPF program that allows OOB reads and
> writes, potentially leading to privilege escalation.
>
> [Potential regression]
> Some BPF programs could fail to load.
>
> [Test case]
> I managed to get a soft lockup with a reproducer. After the fix, the
> program finishes as expected.
>
> Daniel Borkmann (1):
> bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds
>
> kernel/bpf/verifier.c | 8 +++-----
> tools/testing/selftests/bpf/verifier/array_access.c | 2 +-
> 2 files changed, 4 insertions(+), 6 deletions(-)
>
Applied to groovy:linux.
Already applied to hirsute:linux via upstream stable (LP: #1929455).
Thanks,
Kleber
More information about the kernel-team
mailing list