[SRU][F][PATCH v2 0/1] CVE-2024-38662

Massimiliano Pellizzer massimiliano.pellizzer at canonical.com
Wed Nov 27 15:13:26 UTC 2024


[Impact]

bpf: Allow delete from sockmap/sockhash only if update is allowed

>From now on only BPF programs which were previously allowed to update
sockmap/sockhash can delete from these map types.

[Fix]

Noble:  Fixed via stable updates (f8457aa6c401bf)
Jammy:  Fixed via stable updates (4aaeb3bf863dc1c)
Focal:  Backported from mainline
Bionic: Not affected
Xenial: Not affected

[Test Case]

Compile and boot tested.

[Where problems could occur]

The fix affects the BPF subsystem and in particular sockmap and sockhash
structures. Users may see kernel warnings or experience system
instability while performing socket operations when utilizing BPF-based
socket management. Moreover, since the patch modifies how the BPF
verifier checks which BPF programs get accepted, users may also notice
unexpected rejections from the verifier.

[Changes between v1 and v2]

The mainline fix commit modifies the function may_update_sockmap(). The
changes to this function are necessary, because the function is used by
the verifier to check whether a BPF program can delete elements from
sockmap and sockhash or not. The function is not implemented in Focal.
V2 backports also may_update_sockmap().

Jakub Sitnicki (1):
  bpf: Allow delete from sockmap/sockhash only if update is allowed

 kernel/bpf/verifier.c | 2 --
 1 file changed, 2 deletions(-)

-- 
2.43.0




More information about the kernel-team mailing list