bpf: misleading spec_v1 check on variable-offset stack read?
From: Luis Gerhorst
Date: Wed Mar 15 2023 - 12:51:41 EST
Hello,
is there any way to introduce variable-offset (stack) pointers without
using pointer arithmetic (BPF_ADD/SUB)? If yes, I believe this is a
security issue because these can be used in stack writes. If not, I
think the patch sent in reply to this mail should be applied. (I was not
able to find any indication that the former is the case.)
Best regards,
Luis
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature