APPLIED: [SRU][Lunar][PATCH 0/4] CVE-2023-39191
Stefan Bader
stefan.bader at canonical.com
Tue Jan 30 09:51:56 UTC 2024
On 26.01.24 23:44, Bethany Jamison wrote:
> [Impact]
>
> An improper input validation flaw was found in the eBPF subsystem in the
> Linux kernel. The issue occurs due to a lack of proper validation of
> dynamic pointers within user-supplied eBPF programs prior to executing
> them. This may allow an attacker with CAP_BPF privileges to escalate
> privileges and execute arbitrary code in the context of the kernel.
>
> [Fix]
>
> Clean cherry-picks. 3 fix commits were skipped because they were already
> applied upstream.
>
> [Test Case]
>
> Compile and boot tested.
>
> [Regression Potential]
>
> Issues could occur when using bpf dynamic pointers.
>
> Kumar Kartikeya Dwivedi (4):
> bpf: Invalidate slices on destruction of dynptrs on stack
> bpf: Allow reinitializing unreferenced dynptr stack slots
> bpf: Combine dynptr_get_spi and is_spi_bounds_valid
> bpf: Avoid recomputing spi in process_dynptr_func
>
> include/linux/bpf_verifier.h | 5 +-
> kernel/bpf/verifier.c | 201 +++++++++++-------
> .../testing/selftests/bpf/progs/dynptr_fail.c | 4 +-
> 3 files changed, 135 insertions(+), 75 deletions(-)
>
Applied to lunar:linux/master-next (unlikely to be released). Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240130/cff7ab4b/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240130/cff7ab4b/attachment-0001.sig>
More information about the kernel-team
mailing list