CVE-2021-4159 was fixed by this same commit.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-4159

** Information type changed from Private Security to Public Security

** Changed in: linux (Ubuntu)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1954904

Title:
  bpf pointer tainted kaslr leak

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  [Impact]
  adjust_ptr_min_max_vals will allow a pointer arithmetic with any value, but 
set the register to a SCALAR, preventing further pointer operations, leading to 
a pointer leak, aka, KASLR leak.

  [Potential regression]
  Any potential fixes will change the verifier, which means that some BPF code 
that was previously allowed may be prevented to load. It may also lead to other 
code being allowed that leads to other vulnerabilities.

  [Test case]
  Use a privately shared code to test it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954904/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to