From patchwork Fri Sep 27 12:22:43 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Massimiliano Pellizzer X-Patchwork-Id: 1990267 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4XFV4q5Tvrz1xt8 for ; Fri, 27 Sep 2024 22:23:55 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1suA0h-0001CP-IE; Fri, 27 Sep 2024 12:23:47 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1suA0e-00010R-Mn for kernel-team@lists.ubuntu.com; Fri, 27 Sep 2024 12:23:44 +0000 Received: from mail-ej1-f71.google.com (mail-ej1-f71.google.com [209.85.218.71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id ED7D13F03F for ; Fri, 27 Sep 2024 12:23:35 +0000 (UTC) Received: by mail-ej1-f71.google.com with SMTP id a640c23a62f3a-a8a6fee3ab1so166504266b.3 for ; Fri, 27 Sep 2024 05:23:35 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1727439815; x=1728044615; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=uU8v1ufOBhEfYnd3LlzlfBeo4+EH1rIMiSRPkUmI/0U=; b=n03vZjbyhABanDwkkkGRFTTVKB7Em01NvikvCdJnifHm+x+5Q7w59X4kNxyYuE3OmV wIV51BQ4suocm5I1iIq0e7wAkTrlULezUIE8V61GZI8b0UlojzGljl70CCl5LZSKndDR l2NqlwQy0KXTVGGGhSg9Gad3uxoUPCkl34PzLsWE2BPBcrsPKaDv5lipjm6vZvcOgz8F xRkxUuYkiIkfE23mJlyt8ofQOTub+IDYmQWJQFAjE9A2FQvcKZ0bpKTmGqqdYFovZoO1 NvifQfdvjyhCdkKPtzn0/jim2G9u0wveOgDWi+5NDVHVC2o+XBAxrEbZEUKXu3Ex6eLN sCjg== X-Gm-Message-State: AOJu0Yz0iJLh558WxTsp/2CWRtl5xZRCNCNW8NWhwC5axYvy3PsPSCYa QSJGWOs2UwMaDVTSS3o6zlmy+ywUWwP89XViA7kvFWI6E2zuPrL8AUBLR7YLJ3XP5KjtByz+wQl iSbuYCuaDsTJCPafRXN1Zi2azbDfGaJTuVIbVLJHUzxnImebhKuFt2vCcVuyKB0iF/yLpz2j7xv RBV623PjePhw== X-Received: by 2002:a17:906:794f:b0:a80:f840:9004 with SMTP id a640c23a62f3a-a93c48eea6emr287467766b.12.1727439814851; Fri, 27 Sep 2024 05:23:34 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEawp7U6bNwdam0LJtiHjldjkp8L/dovSm/ftYS3D0CjB4W0PEW4o/oX93BqJeVafABCgvs8g== X-Received: by 2002:a17:906:794f:b0:a80:f840:9004 with SMTP id a640c23a62f3a-a93c48eea6emr287467066b.12.1727439814375; Fri, 27 Sep 2024 05:23:34 -0700 (PDT) Received: from framework-canonical.station (net-93-71-67-9.cust.vodafonedsl.it. [93.71.67.9]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-a93c2945f2esm128052366b.117.2024.09.27.05.23.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Sep 2024 05:23:33 -0700 (PDT) From: Massimiliano Pellizzer To: kernel-team@lists.ubuntu.com Subject: [SRU][F][PATCH 0/1] CVE-2024-36938 Date: Fri, 27 Sep 2024 14:22:43 +0200 Message-ID: <20240927122321.34030-1-massimiliano.pellizzer@canonical.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" [Impact] Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() [Fix] Noble: Fixed Jammy: Fixed Focal: Cherry picked from linux-5.10.y Bionic: Not affected Xenial: Not affected [Test Case] Compile and boot tested. [Where problems could occur] The fix affects the networking subsystem, specifically the BPF sockmap implementation. An issue with this fix may lead to kernel crashes when handling network traffic, particularly under heavy load or high concurrency. Users may also experience poor network performance, failed socket operations, or application crashes involving BPF programs. Jason Xing (1): bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue include/linux/skmsg.h | 2 ++ 1 file changed, 2 insertions(+)