ACK: [SRU][X][PATCH 1/1] UBUNTU: SAUCE: Revert "printk: hash addresses printed with %p"
Krzysztof Kozlowski
krzysztof.kozlowski at canonical.com
Thu Apr 1 09:22:41 UTC 2021
On 01/04/2021 11:13, Kleber Sacilotto de Souza wrote:
> BugLink: https://bugs.launchpad.net/bugs/1922200
>
> This reverts commit 5d742149ceb112c61ee576f371b574da32532c43 (commit
> ad67b74d2469d9b82aaa572d76474c95bc484d57 upstream).
>
> The backport of this upstream commit, applied to fix CVEs
> CVE-2018-5953/CVE-2018-5995/CVE-2018-7754 on xenial/linux, introduced a
> regression on the addresses exported via /proc interfaces (mainly
> /proc/kallsyms). The patch leaks what the address 0x0 hashes to for
> regular users instead of the expected zeroed out values. It also mangles
> the default address for 'startup_64' expected to be 'ffffffff81000000'
> for non-kaslr kernels (<4.15).
>
> Signed-off-by: Kleber Sacilotto de Souza <kleber.souza at canonical.com>
> ---
> Documentation/printk-formats.txt | 11 ----
> lib/test_printf.c | 108 +++++++++++--------------------
> lib/vsprintf.c | 81 ++---------------------
> 3 files changed, 45 insertions(+), 155 deletions(-)
Acked-by: Krzysztof Kozlowski <krzysztof.kozlowski at canonical.com>
The backport changes user-visible behavior (e.g. logs) so the interface
used by some apps might be affected. The impact of CVE is low, so I
agree with skipping the backport.
Best regards,
Krzysztof
More information about the kernel-team
mailing list