** Changed in: iotop (Ubuntu Xenial)
       Status: Confirmed => Invalid

** Changed in: iotop (Ubuntu)
       Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
       Status: Incomplete => In Progress

** Changed in: linux (Ubuntu Xenial)
     Assignee: (unassigned) => Tyler Hicks (tyhicks)

** Changed in: linux (Ubuntu)
       Status: Incomplete => Invalid

** Description changed:

+ [Impact]
+ The CVE-2018-3639 for Xenial introduced a double newline sequence in the 
/proc/PID/status files. This breaks some userspace tools, such as iotop, that 
parse those files.
+ 
+ [Test Case]
+ Incorrect output in 4.4.0-127.153-generic:
+ 
+ $ cat /proc/self/status
+  ...
+ Seccomp:      0
+ 
+ Speculation_Store_Bypass:     thread vulnerable
+ ...
+ 
+ Expected output:
+ 
+ $ cat /proc/self/status
+  ...
+ Seccomp:      0
+ Speculation_Store_Bypass:     thread vulnerable
+ ...
+ 
+ [Regression Potential]
+ None
+ 
+ [Original Report]
+ 
  Hello,
  
  after running updates today to linux-
  image-4.4.0-127-generic_4.4.0-127.153 and rebooting i noticed that iotop
  is not working any more. Reason are empty lines in /proc/PID/status,
  which confuse iotop (and me)
  
  In new view there is an empy line between Seccomp and
  Speculation_Store_Bypass:
  
  ####
  Seccomp:        0
  
  Speculation_Store_Bypass:       vulnerable
  ####
  Speculation_Store_Bypass seems to be new in /proc/PID/status, may be a 
relation to spectre/meltdown patches.
  
  iotop is first application which is failing here, but iam afraid of
  more.
  
  Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1772671

Title:
  Kernel produces empty lines in /proc/PID/status

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iotop/+bug/1772671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to