ACK: [SRU OEM-5.17,OEM-6.0 0/1] CVE-2023-2163
Tim Gardner
tim.gardner at canonical.com
Fri Aug 4 13:10:26 UTC 2023
On 8/4/23 5:32 AM, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
> discovered that the BPF verifier in the Linux kernel did not properly mark
> registers for precision tracking in certain situations, leading to an out-
> of-bounds access vulnerability. A local attacker could use this to cause a
> denial of service (system crash) or possibly execute arbitrary code.
>
> [Potential regression]
> eBPF users may notice regressions.
>
> Daniel Borkmann (1):
> bpf: Fix incorrect verifier pruning due to missing register precision
> taints
>
> kernel/bpf/verifier.c | 15 +++++++++++++++
> 1 file changed, 15 insertions(+)
>
Acked-by: Tim Gardner <tim.gardner at canonical.com>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list