ACK: [SRU Focal/Impish 0/1] CVE-2022-1055

Stefan Bader stefan.bader at canonical.com
Thu Mar 24 14:26:19 UTC 2022


On 24.03.22 12:22, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An unprivileged user can use TC to write to out-of-bounds memory, possibly
> leading to a privilege escalation.
> 
> [Backport]
> There was no flags at tc_new_tfilter, which was introduced by a later rewrite.
> 
> [Test case]
> The syzkaller report had no reproducer, and one could not be found or written.
> 
> [Potential regression]
> qdisc configuration and use can lead to unexpected network behavior.
> 
> Eric Dumazet (1):
>    net: sched: fix use-after-free in tc_new_tfilter()
> 
>   net/sched/cls_api.c | 11 +++++++----
>   1 file changed, 7 insertions(+), 4 deletions(-)
> 

Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20220324/c59cc09d/attachment.sig>


More information about the kernel-team mailing list