This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
bionic' to 'verification-done-bionic'. If the problem still exists,
change the tag 'verification-needed-bionic' to 'verification-failed-

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See for documentation how
to enable and use -proposed. Thank you!

** Tags added: verification-needed-bionic

You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.

  BPF: kernel pointer leak to unprivileged userspace

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Committed

Bug description:

  Per Jann Horn, "Upstream commit dd066823db2ac4e22f721ec85190817b58059a54
  ("bpf/verifier: disallow pointer subtraction") fixes a security bug
  (kernel pointer leak to unprivileged userspace)."

  [Test Case]

  Run the "check subtraction on pointers for unpriv" test from
  tools/testing/selftests/bpf/test_verifier.c. The test should pass if
  the bug is fixed, fail otherwise.

  [Regression Potential]

  The change could cause a regression in an unprivileged process that is
  using eBPF. I suspect that this is unlikely. The alternative is to
  leave a potential security hole open.

To manage notifications about this bug go to:

Mailing list:
Post to     :
Unsubscribe :
More help   :

Reply via email to