[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 21 Dec 2017 03:20:01 +0100
From: Daniel Borkmann <daniel@...earbox.net>
To: Alexei Starovoitov <ast@...nel.org>,
"David S . Miller" <davem@...emloft.net>
Cc: Jann Horn <jannh@...gle.com>, Edward Cree <ecree@...arflare.com>,
netdev@...r.kernel.org, kernel-team@...com
Subject: Re: [PATCH bpf 0/9] bpf: verifier security fixes
On 12/19/2017 05:11 AM, Alexei Starovoitov wrote:
> This patch set addresses a set of security vulnerabilities
> in bpf verifier logic discovered by Jann Horn.
> All of the patches are candidates for 4.14 stable.
>
> Alexei Starovoitov (1):
> bpf: fix integer overflows
>
> Edward Cree (1):
> bpf/verifier: fix bounds calculation on BPF_RSH
>
> Jann Horn (7):
> bpf: fix incorrect sign extension in check_alu_op()
> bpf: fix incorrect tracking of register size truncation
> bpf: fix 32-bit ALU op verification
> bpf: fix missing error return in check_stack_boundary()
> bpf: force strict alignment checks for stack pointers
> bpf: don't prune branches when a scalar is replaced with a pointer
> selftests/bpf: add tests for recent bugfixes
>
> include/linux/bpf_verifier.h | 4 +-
> kernel/bpf/verifier.c | 175 ++++++---
> tools/testing/selftests/bpf/test_verifier.c | 549 +++++++++++++++++++++++++++-
> 3 files changed, 661 insertions(+), 67 deletions(-)
Series applied to bpf tree and queued for stable, thanks everyone!
Powered by blists - more mailing lists