mbox series

[UBUNTU,Bionic,Focal,Jammy,Kinetic,OEM-5.14,OEM-5.17,OEM-6.0,0/1] CVE-2023-1281

Message ID 20230315152103.767189-1-cascardo@canonical.com
Headers show
Series CVE-2023-1281 | expand

Message

Thadeu Lima de Souza Cascardo March 15, 2023, 3:20 p.m. UTC
[Impact]
An unprivileged user may exploit a use-after-free condition with the tcindex
classifier, leading to possible local escalation of privilege.

[Backport]
The fix uses rcu_replace_pointer, which was not available on 4.15 and 5.4.
A backport to add it was done on those branches.

The tcindex classifier was removed on 6.1 and 6.2 kernels.

[Potential regression]
Only tcindex classifiers are under risk of regressions.


Paul E. McKenney (1):
  rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()

Pedro Tammela (1):
  net/sched: tcindex: update imperfect hash filters respecting rcu

 include/linux/rcupdate.h | 18 ++++++++++++++++++
 net/sched/cls_tcindex.c  | 34 ++++++++++++++++++++++++++++++----
 2 files changed, 48 insertions(+), 4 deletions(-)

Comments

Stefan Bader March 16, 2023, 8:49 a.m. UTC | #1
On 15.03.23 16:20, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An unprivileged user may exploit a use-after-free condition with the tcindex
> classifier, leading to possible local escalation of privilege.
> 
> [Backport]
> The fix uses rcu_replace_pointer, which was not available on 4.15 and 5.4.
> A backport to add it was done on those branches.
> 
> The tcindex classifier was removed on 6.1 and 6.2 kernels.
> 
> [Potential regression]
> Only tcindex classifiers are under risk of regressions.
> 
> 
> Paul E. McKenney (1):
>    rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
> 
> Pedro Tammela (1):
>    net/sched: tcindex: update imperfect hash filters respecting rcu
> 
>   include/linux/rcupdate.h | 18 ++++++++++++++++++
>   net/sched/cls_tcindex.c  | 34 ++++++++++++++++++++++++++++++----
>   2 files changed, 48 insertions(+), 4 deletions(-)
> 

Acked-by: Stefan Bader <stefan.bader@canonical.com>
Cengiz Can March 16, 2023, 1:55 p.m. UTC | #2
On Wed, 2023-03-15 at 12:20 -0300, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An unprivileged user may exploit a use-after-free condition with the tcindex
> classifier, leading to possible local escalation of privilege.
> 
> [Backport]
> The fix uses rcu_replace_pointer, which was not available on 4.15 and 5.4.
> A backport to add it was done on those branches.
> 
> The tcindex classifier was removed on 6.1 and 6.2 kernels.
> 
> [Potential regression]
> Only tcindex classifiers are under risk of regressions.
> 
> 

Acked-by: Cengiz Can <cengiz.can@canonical.com>

> Paul E. McKenney (1):
>   rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
> 
> Pedro Tammela (1):
>   net/sched: tcindex: update imperfect hash filters respecting rcu
> 
>  include/linux/rcupdate.h | 18 ++++++++++++++++++
>  net/sched/cls_tcindex.c  | 34 ++++++++++++++++++++++++++++++----
>  2 files changed, 48 insertions(+), 4 deletions(-)
> 
> -- 
> 2.34.1
> 
>
Timo Aaltonen March 16, 2023, 2:29 p.m. UTC | #3
Thadeu Lima de Souza Cascardo kirjoitti 15.3.2023 klo 17.20:
> [Impact]
> An unprivileged user may exploit a use-after-free condition with the tcindex
> classifier, leading to possible local escalation of privilege.
> 
> [Backport]
> The fix uses rcu_replace_pointer, which was not available on 4.15 and 5.4.
> A backport to add it was done on those branches.
> 
> The tcindex classifier was removed on 6.1 and 6.2 kernels.
> 
> [Potential regression]
> Only tcindex classifiers are under risk of regressions.
> 
> 
> Paul E. McKenney (1):
>    rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
> 
> Pedro Tammela (1):
>    net/sched: tcindex: update imperfect hash filters respecting rcu
> 
>   include/linux/rcupdate.h | 18 ++++++++++++++++++
>   net/sched/cls_tcindex.c  | 34 ++++++++++++++++++++++++++++++----
>   2 files changed, 48 insertions(+), 4 deletions(-)
> 

applied to oem kernels, thanks
Luke Nowakowski-Krijger March 16, 2023, 8:22 p.m. UTC | #4
Applied to bionic, focal, jammy, kinetic linux master-next

Thanks!~
- Luke

On Wed, Mar 15, 2023 at 8:22 AM Thadeu Lima de Souza Cascardo <
cascardo@canonical.com> wrote:

> [Impact]
> An unprivileged user may exploit a use-after-free condition with the
> tcindex
> classifier, leading to possible local escalation of privilege.
>
> [Backport]
> The fix uses rcu_replace_pointer, which was not available on 4.15 and 5.4.
> A backport to add it was done on those branches.
>
> The tcindex classifier was removed on 6.1 and 6.2 kernels.
>
> [Potential regression]
> Only tcindex classifiers are under risk of regressions.
>
>
> Paul E. McKenney (1):
>   rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
>
> Pedro Tammela (1):
>   net/sched: tcindex: update imperfect hash filters respecting rcu
>
>  include/linux/rcupdate.h | 18 ++++++++++++++++++
>  net/sched/cls_tcindex.c  | 34 ++++++++++++++++++++++++++++++----
>  2 files changed, 48 insertions(+), 4 deletions(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>