Your message dated Sat, 12 May 2012 19:01:27 +0100 with message-id <1336845687.9080.1.camel@deadeye> and subject line Re: Bug#672660: linux-2.6: CVE-2012-0810 kernel-rt: stack corruption when task gets scheduled out using the debug stack has caused the Debian Bug report #672660, regarding linux-2.6: CVE-2012-0810 kernel-rt: stack corruption when task gets scheduled out using the debug stack to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 672660: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672660 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux-2.6: CVE-2012-0810 kernel-rt: stack corruption when task gets scheduled out using the debug stack
- From: Arne Wichmann <aw@linux.de>
- Date: Sat, 12 May 2012 19:46:42 +0200
- Message-id: <[🔎] 20120512174642.16392.55511.reportbug@anhrefn.saar.de>
Package: linux-2.6 Version: 3.2.16-1 Severity: grave Tags: security Justification: user security hole This seems to have slipped through the kernel-sec repository... Citing Redhat: The issue is that the int3 handler uses a per CPU debug stack, and calls do_traps() with interrupts enabled but preemption disabled. Then a signal is sent to the current process, and the code that handles the signal grabs a spinlock. This spinlock becomes a mutex (sleeping lock) when CONFIG_PREEMPT_RT_FULL is enabled. If there is contention on this lock then the task may schedule out. As the task is using a per CPU stack, and another task may come in and use the same stack, the stack can become corrupted and cause the kernel to panic. http://security-tracker.debian.org/tracker/CVE-2012-0810 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0810 Keep up the good work, AW -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable'), (40, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.16 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
- To: 672660-done@bugs.debian.org
- Subject: Re: Bug#672660: linux-2.6: CVE-2012-0810 kernel-rt: stack corruption when task gets scheduled out using the debug stack
- From: Ben Hutchings <ben@decadent.org.uk>
- Date: Sat, 12 May 2012 19:01:27 +0100
- Message-id: <1336845687.9080.1.camel@deadeye>
- In-reply-to: <[🔎] 20120512174642.16392.55511.reportbug@anhrefn.saar.de>
- References: <[🔎] 20120512174642.16392.55511.reportbug@anhrefn.saar.de>
On Sat, 2012-05-12 at 19:46 +0200, Arne Wichmann wrote: > Package: linux-2.6 > Version: 3.2.16-1 > Severity: grave > Tags: security > Justification: user security hole > > This seems to have slipped through the kernel-sec repository... [...] What? I just marked it fixed there. sid: released (3.2.9-1) [features/all/rt/oleg-signal-rt-fix.patch, features/all/rt/fix-rt-int3-x86_32-3.2-rt.patch] Ben. -- Ben Hutchings Experience is directly proportional to the value of equipment destroyed. - Carolyn ScheppnerAttachment: signature.asc
Description: This is a digitally signed message part
--- End Message ---