ACK/Cmnt: [SRU][Lunar][PATCH 0/4] CVE-2023-39191
Stefan Bader
stefan.bader at canonical.com
Tue Jan 30 08:46:20 UTC 2024
On 26.01.24 23:44, Bethany Jamison wrote:
> [Impact]
>
> An improper input validation flaw was found in the eBPF subsystem in the
> Linux kernel. The issue occurs due to a lack of proper validation of
> dynamic pointers within user-supplied eBPF programs prior to executing
> them. This may allow an attacker with CAP_BPF privileges to escalate
> privileges and execute arbitrary code in the context of the kernel.
>
> [Fix]
>
> Clean cherry-picks. 3 fix commits were skipped because they were already
> applied upstream.
>
> [Test Case]
>
> Compile and boot tested.
>
> [Regression Potential]
>
> Issues could occur when using bpf dynamic pointers.
>
> Kumar Kartikeya Dwivedi (4):
> bpf: Invalidate slices on destruction of dynptrs on stack
> bpf: Allow reinitializing unreferenced dynptr stack slots
> bpf: Combine dynptr_get_spi and is_spi_bounds_valid
> bpf: Avoid recomputing spi in process_dynptr_func
>
> include/linux/bpf_verifier.h | 5 +-
> kernel/bpf/verifier.c | 201 +++++++++++-------
> .../testing/selftests/bpf/progs/dynptr_fail.c | 4 +-
> 3 files changed, 135 insertions(+), 75 deletions(-)
>
All cherry picks which compile successful. Since work already has been
done we would apply things but as mentioned by Yuxuan Lunar is EOL and
there are no releases planned. I don't know how much this changes but I
would push any Lunar work that is not above medium rather far down the
queue.
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240130/6b87d346/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240130/6b87d346/attachment-0001.sig>
More information about the kernel-team
mailing list