Message ID | 20231025205611.1626111-1-cascardo@canonical.com |
---|---|
Headers | show |
Series | CVE-2023-5717 | expand |
On 25/10/2023 22:56, Thadeu Lima de Souza Cascardo wrote: > [Impact] > Users with access to perf (CAP_PERFMON) or unprivileged users on systems > where sysctl kernel.perf_event_paranoid is less than 1 may escalate > privileges. > > [Backport] > All clean cherry-picks, but could not apply cleanly (except with --3way), > hence the multiple submissions. > > [Potential regressions] > performance monitoring (perf command) may break. > > Peter Zijlstra (1): > perf: Disallow mis-matched inherited group reads > > include/linux/perf_event.h | 1 + > kernel/events/core.c | 39 ++++++++++++++++++++++++++++++++------ > 2 files changed, 34 insertions(+), 6 deletions(-) > Acked-by: Roxana Nicolescu <roxana.nicolescu@canonical.com>
Thadeu Lima de Souza Cascardo kirjoitti 25.10.2023 klo 23.56: > [Impact] > Users with access to perf (CAP_PERFMON) or unprivileged users on systems > where sysctl kernel.perf_event_paranoid is less than 1 may escalate > privileges. > > [Backport] > All clean cherry-picks, but could not apply cleanly (except with --3way), > hence the multiple submissions. > > [Potential regressions] > performance monitoring (perf command) may break. > > Peter Zijlstra (1): > perf: Disallow mis-matched inherited group reads > > include/linux/perf_event.h | 1 + > kernel/events/core.c | 39 ++++++++++++++++++++++++++++++++------ > 2 files changed, 34 insertions(+), 6 deletions(-) > applied to oem-6.1, thanks
On 25.10.23 22:56, Thadeu Lima de Souza Cascardo wrote: > [Impact] > Users with access to perf (CAP_PERFMON) or unprivileged users on systems > where sysctl kernel.perf_event_paranoid is less than 1 may escalate > privileges. > > [Backport] > All clean cherry-picks, but could not apply cleanly (except with --3way), > hence the multiple submissions. > > [Potential regressions] > performance monitoring (perf command) may break. > > Peter Zijlstra (1): > perf: Disallow mis-matched inherited group reads > > include/linux/perf_event.h | 1 + > kernel/events/core.c | 39 ++++++++++++++++++++++++++++++++------ > 2 files changed, 34 insertions(+), 6 deletions(-) > Acked-by: Stefan Bader <stefan.bader@canonical.com>
On 25/10/2023 22:56, Thadeu Lima de Souza Cascardo wrote: > [Impact] > Users with access to perf (CAP_PERFMON) or unprivileged users on systems > where sysctl kernel.perf_event_paranoid is less than 1 may escalate > privileges. > > [Backport] > All clean cherry-picks, but could not apply cleanly (except with --3way), > hence the multiple submissions. > > [Potential regressions] > performance monitoring (perf command) may break. > > Peter Zijlstra (1): > perf: Disallow mis-matched inherited group reads > > include/linux/perf_event.h | 1 + > kernel/events/core.c | 39 ++++++++++++++++++++++++++++++++------ > 2 files changed, 34 insertions(+), 6 deletions(-) > Applied to f,j,l,m:master-next. Thanks! Roxana