ACK: [SRU OEM-5.17,OEM-6.0 0/1] CVE-2023-2163

Tim Gardner tim.gardner at canonical.com
Fri Aug 4 13:10:26 UTC 2023


On 8/4/23 5:32 AM, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
>   Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
>   discovered that the BPF verifier in the Linux kernel did not properly mark
>   registers for precision tracking in certain situations, leading to an out-
>   of-bounds access vulnerability. A local attacker could use this to cause a
>   denial of service (system crash) or possibly execute arbitrary code.
> 
> [Potential regression]
> eBPF users may notice regressions.
> 
> Daniel Borkmann (1):
>    bpf: Fix incorrect verifier pruning due to missing register precision
>      taints
> 
>   kernel/bpf/verifier.c | 15 +++++++++++++++
>   1 file changed, 15 insertions(+)
> 
Acked-by: Tim Gardner <tim.gardner at canonical.com>
-- 
-----------
Tim Gardner
Canonical, Inc




More information about the kernel-team mailing list