From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.5 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_PASS,USER_AGENT_MUTT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 01232C4360F for ; Tue, 12 Mar 2019 16:22:34 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id B10212147C for ; Tue, 12 Mar 2019 16:22:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552407753; bh=+I8kcF+Pbxp8qL0yc3rEydwRSmErlmD1LM74zyn4Efs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=Pr4JDKQgER/4dt8KdPhxGwmo5En6lxhaQeKbXiOyfcREWYZwGwurfmCVCp20HwUwy q3Mmc1NSc7f0e27inraHXASWqIEskuXFNownH2ivPWnMkp7Feilzm8MvQWUXRg6gKF iNwD1xq6VsB1q+qIuofaxbIooFEY7TtHvUZI6Z9Q= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726623AbfCLQWc (ORCPT ); Tue, 12 Mar 2019 12:22:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:40894 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726255AbfCLQWc (ORCPT ); Tue, 12 Mar 2019 12:22:32 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B938F20657; Tue, 12 Mar 2019 16:22:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552407751; bh=+I8kcF+Pbxp8qL0yc3rEydwRSmErlmD1LM74zyn4Efs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=JxEToS3FNMeVLcSkRQMUbNHeVNM4Q5h7LEfEDMkmLCKDDIGzKkWZkKyzTWXv6Mggf tU4WxqX9j1QWPVZY7469H4wFvslD2e2/T6nsZdLDMu7azLLM0TeAVCRRwUUWC2ZYVm gRPGwXRs6FrD7nQcR+K3IB0s0s1OrKupHK0gW4Tw= Date: Tue, 12 Mar 2019 09:22:30 -0700 From: Greg KH To: Jason Yan Cc: daniel@iogearbox.net, Jann Horn , ast@kernel.org, "zhangyi (F)" , Zhaohongjiang , netdev@vger.kernel.org, stable@vger.kernel.org Subject: Re: 979d63d50c0c0f7bc537bf821e056cc9fe5abd38 bpf: prevent out of bounds speculation on pointer arithmetic Message-ID: <20190312162230.GA4544@kroah.com> References: <5d71646c-f897-2178-9d4a-fababe999f36@huawei.com> <20190312115234.GA29195@kroah.com> <71d3dd3d-7768-63bc-b050-3caafec53d03@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <71d3dd3d-7768-63bc-b050-3caafec53d03@huawei.com> User-Agent: Mutt/1.11.3 (2019-02-01) Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On Tue, Mar 12, 2019 at 10:58:39PM +0800, Jason Yan wrote: > > > On 2019/3/12 19:52, Greg KH wrote: > > On Mon, Mar 11, 2019 at 05:18:33PM +0800, Jason Yan wrote: > > > Hi, Daniel & Greg > > > > > > This patch (979d63d50c0c bpf: prevent out of bounds speculation on pointer > > > arithmetic) was assigned a CVE (CVE-2019-7308) with a high score: > > > > > > CVSS v3.0 Severity and Metrics: > > > Base Score: 9.8 CRITICAL > > > > > > And this patch is not in stable-4.4, would you please backport this patch to > > > 4.4? > > > > For a bit more context, it's also not in 4.14.y, 4.9.y, or 4.4.y. I > > found a backported series for 4.4.y in the SLES kernel tree that I could > > try to import here if it really is a big deal. > > > > I'm sorry that I did not find them. I only know the SLES kernel tree at: > https://github.com/openSUSE/kernel. > Is there another place for the SLES kernel tree? That's the tree you want, look at the SLES branches. I see the patches backported to the SLE12-SP4 branch already, so that is hopefully a working set of patches for 4.4.y. thanks, greg k-h