APPLIED: [SRU][Focal][PATCH 0/1] CVE-2021-4001

Stefan Bader stefan.bader at canonical.com
Thu Aug 31 08:17:13 UTC 2023


On 07.08.23 15:21, Jacob Martin wrote:
> [Impact]
>   It was discovered that the eBPF implementation in the Linux kernel
>   contained a race condition around read-only maps. A privileged attacker
>   could use this to modify read-only maps.
> 
> [Backport]
>   Memory mapping and batch support for BPF maps are not present in
>   focal:linux, so changes to missing functions were omitted, and writecnt
>   was added to struct bpf_map.
> 
> [Test]
>   Compile and boot tested. Verified prior-working race using userfaultfd
>   was no longer achievable with patch applied.
> 
> [Potential Regression]
>   This change affects the kernel's BPF subsystem.
> 
> Daniel Borkmann (1):
>    bpf: Fix toctou on read-only map's constant scalar tracking
> 
>   include/linux/bpf.h   |  2 ++
>   kernel/bpf/syscall.c  | 25 +++++++++++++++++++++++++
>   kernel/bpf/verifier.c | 18 +++++++++++++++++-
>   3 files changed, 44 insertions(+), 1 deletion(-)
> 

Applied to focal:linux/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230831/0422a8b7/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230831/0422a8b7/attachment-0001.sig>


More information about the kernel-team mailing list