ACK: [SRU OEM-5.10/HWE-5.11/Impish/OEM-5.14/Jammy 0/3] CVE-2022-23222
Kamal Mostafa
kamal at canonical.com
Fri Jan 28 18:18:40 UTC 2022
Acked-by: Kamal Mostafa <kamal at canonical.com>
-Kamal
On Fri, Jan 28, 2022 at 03:00:00PM -0300, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Unprivileged user with bpf access may trigger an out-of-bounds access.
>
> [Backport]
> As this was fixed by a larger patchset on mainline, a different fix was
> applied to older kernels.
>
> Then, there is a hardening fix and an additional test to cover this case.
>
> The first patch was already applied on OEM-5.14 and Jammy.
>
> [Test case]
> The additional verifier test was tested, as was another test program.
>
> [Potential regression]
> BPF users would be affected and BPF tests may start to fail.
>
> Daniel Borkmann (3):
> bpf: Fix out of bounds access from invalid *_or_null type verification
> bpf: Don't promote bogus looking registers after null check.
> bpf, selftests: Add verifier test for mem_or_null register with
> offset.
>
> kernel/bpf/verifier.c | 18 ++++++------
> .../selftests/bpf/verifier/spill_fill.c | 28 +++++++++++++++++++
> 2 files changed, 37 insertions(+), 9 deletions(-)
>
> --
> 2.32.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list