[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#672660: marked as done (linux-2.6: CVE-2012-0810 kernel-rt: stack corruption when task gets scheduled out using the debug stack)



Your message dated Sat, 12 May 2012 19:01:27 +0100
with message-id <1336845687.9080.1.camel@deadeye>
and subject line Re: Bug#672660: linux-2.6: CVE-2012-0810 kernel-rt: stack corruption when task gets scheduled out using the debug stack
has caused the Debian Bug report #672660,
regarding linux-2.6: CVE-2012-0810 kernel-rt: stack corruption when task gets scheduled out using the debug stack
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
672660: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672660
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: 3.2.16-1
Severity: grave
Tags: security
Justification: user security hole

This seems to have slipped through the kernel-sec repository...

Citing Redhat:

The issue is that the int3 handler uses a per CPU debug stack, and calls
do_traps() with interrupts enabled but preemption disabled. Then a signal
is sent to the current process, and the code that handles the signal grabs
a spinlock. This spinlock becomes a mutex (sleeping lock) when
CONFIG_PREEMPT_RT_FULL is enabled.

If there is contention on this lock then the task may schedule out. As the
task is using a per CPU stack, and another task may come in and use the
same stack, the stack can become corrupted and cause the kernel to panic.

http://security-tracker.debian.org/tracker/CVE-2012-0810
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0810

Keep up the good work,

AW

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable'), (40, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.16 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
On Sat, 2012-05-12 at 19:46 +0200, Arne Wichmann wrote:
> Package: linux-2.6
> Version: 3.2.16-1
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> This seems to have slipped through the kernel-sec repository...
[...]

What?  I just marked it fixed there.

sid: released (3.2.9-1) [features/all/rt/oleg-signal-rt-fix.patch, features/all/rt/fix-rt-int3-x86_32-3.2-rt.patch]

Ben.

-- 
Ben Hutchings
Experience is directly proportional to the value of equipment destroyed.
                                                         - Carolyn Scheppner

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---

Reply to: