mbox series

[UBUNTU,Kinetic,0/2] CVE-2023-0468

Message ID 20230323163530.1122686-1-cascardo@canonical.com
Headers show
Series CVE-2023-0468 | expand

Message

Thadeu Lima de Souza Cascardo March 23, 2023, 4:35 p.m. UTC
[Impact]
Unprivileged users could use io_uring to crash the system or potentially
privilege escalation.

[Backport]
io_uring was split into multiple files. Backported involved mostly applying
the same changes to the single io_ring.c file.

[Potential regression]
io_uring users could regress.

Pavel Begunkov (2):
  io_uring: fix tw losing poll events
  io_uring: make poll refs more robust

 io_uring/io_uring.c | 44 +++++++++++++++++++++++++++++++++++++++++++-
 1 file changed, 43 insertions(+), 1 deletion(-)

Comments

Luke Nowakowski-Krijger March 23, 2023, 4:44 p.m. UTC | #1
Acked-by: Luke Nowakowski-Krijger <luke.nowakowskikrijger@canonical.com>

On Thu, Mar 23, 2023 at 9:37 AM Thadeu Lima de Souza Cascardo <
cascardo@canonical.com> wrote:

> [Impact]
> Unprivileged users could use io_uring to crash the system or potentially
> privilege escalation.
>
> [Backport]
> io_uring was split into multiple files. Backported involved mostly applying
> the same changes to the single io_ring.c file.
>
> [Potential regression]
> io_uring users could regress.
>
> Pavel Begunkov (2):
>   io_uring: fix tw losing poll events
>   io_uring: make poll refs more robust
>
>  io_uring/io_uring.c | 44 +++++++++++++++++++++++++++++++++++++++++++-
>  1 file changed, 43 insertions(+), 1 deletion(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>
Kamal Mostafa March 23, 2023, 5:01 p.m. UTC | #2
Acked-by: Kamal Mostafa <kamal@canonical.com>

 -Kamal

On Thu, Mar 23, 2023 at 01:35:28PM -0300, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Unprivileged users could use io_uring to crash the system or potentially
> privilege escalation.
> 
> [Backport]
> io_uring was split into multiple files. Backported involved mostly applying
> the same changes to the single io_ring.c file.
> 
> [Potential regression]
> io_uring users could regress.
> 
> Pavel Begunkov (2):
>   io_uring: fix tw losing poll events
>   io_uring: make poll refs more robust
> 
>  io_uring/io_uring.c | 44 +++++++++++++++++++++++++++++++++++++++++++-
>  1 file changed, 43 insertions(+), 1 deletion(-)
> 
> -- 
> 2.34.1
> 
> 
> -- 
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
Luke Nowakowski-Krijger March 23, 2023, 7:39 p.m. UTC | #3
Applied to kinetic:linux master-next

Thanks!
- Luke

On Thu, Mar 23, 2023 at 9:37 AM Thadeu Lima de Souza Cascardo <
cascardo@canonical.com> wrote:

> [Impact]
> Unprivileged users could use io_uring to crash the system or potentially
> privilege escalation.
>
> [Backport]
> io_uring was split into multiple files. Backported involved mostly applying
> the same changes to the single io_ring.c file.
>
> [Potential regression]
> io_uring users could regress.
>
> Pavel Begunkov (2):
>   io_uring: fix tw losing poll events
>   io_uring: make poll refs more robust
>
>  io_uring/io_uring.c | 44 +++++++++++++++++++++++++++++++++++++++++++-
>  1 file changed, 43 insertions(+), 1 deletion(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>