ACK: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-5717
Stefan Bader
stefan.bader at canonical.com
Fri Oct 27 08:56:10 UTC 2023
- Previous message (by thread): APPLIED [OEM-6.1] Re: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-5717
- Next message (by thread): APPLIED[F,J,L,M]: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-5717
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
On 25.10.23 22:56, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Users with access to perf (CAP_PERFMON) or unprivileged users on systems
> where sysctl kernel.perf_event_paranoid is less than 1 may escalate
> privileges.
>
> [Backport]
> All clean cherry-picks, but could not apply cleanly (except with --3way),
> hence the multiple submissions.
>
> [Potential regressions]
> performance monitoring (perf command) may break.
>
> Peter Zijlstra (1):
> perf: Disallow mis-matched inherited group reads
>
> include/linux/perf_event.h | 1 +
> kernel/events/core.c | 39 ++++++++++++++++++++++++++++++++------
> 2 files changed, 34 insertions(+), 6 deletions(-)
>
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20231027/fbfce3a5/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20231027/fbfce3a5/attachment-0001.sig>
- Previous message (by thread): APPLIED [OEM-6.1] Re: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-5717
- Next message (by thread): APPLIED[F,J,L,M]: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-5717
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list