APPLIED[B,F,J,K]: [UBUNTU Bionic, Focal, Jammy, Kinetic, OEM-5.14, OEM-5.17, OEM-6.0 0/1] CVE-2023-1281
Luke Nowakowski-Krijger
luke.nowakowskikrijger at canonical.com
Thu Mar 16 20:22:34 UTC 2023
Applied to bionic, focal, jammy, kinetic linux master-next
Thanks!~
- Luke
On Wed, Mar 15, 2023 at 8:22 AM Thadeu Lima de Souza Cascardo <
cascardo at canonical.com> wrote:
> [Impact]
> An unprivileged user may exploit a use-after-free condition with the
> tcindex
> classifier, leading to possible local escalation of privilege.
>
> [Backport]
> The fix uses rcu_replace_pointer, which was not available on 4.15 and 5.4.
> A backport to add it was done on those branches.
>
> The tcindex classifier was removed on 6.1 and 6.2 kernels.
>
> [Potential regression]
> Only tcindex classifiers are under risk of regressions.
>
>
> Paul E. McKenney (1):
> rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
>
> Pedro Tammela (1):
> net/sched: tcindex: update imperfect hash filters respecting rcu
>
> include/linux/rcupdate.h | 18 ++++++++++++++++++
> net/sched/cls_tcindex.c | 34 ++++++++++++++++++++++++++++++----
> 2 files changed, 48 insertions(+), 4 deletions(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230316/d16efb92/attachment.html>
More information about the kernel-team
mailing list