Launchpad has imported 9 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=1373966.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2016-09-07T14:48:59+00:00 Adam wrote: It was found that when gcc stack protector is turned on, proc_keys_show() can cause a panic due to stack corruption. This happens because xbuf[] is not big enough to hold a 64-bit timeout rendered as weeks. Product bug: https://bugzilla.redhat.com/show_bug.cgi?id=1373499 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/0 ------------------------------------------------------------------------ On 2016-09-07T14:49:03+00:00 Adam wrote: Acknowledgments: Name: Ondrej Kozina (Red Hat) Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/1 ------------------------------------------------------------------------ On 2016-09-12T13:40:18+00:00 Vladis wrote: Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue. Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/2 ------------------------------------------------------------------------ On 2016-09-12T13:42:25+00:00 Vladis wrote: Created attachment 1200212 Fix for buffer overflow in proc_keys_show Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/3 ------------------------------------------------------------------------ On 2016-10-13T12:31:14+00:00 Vladis wrote: cve-id CVE-2016-7042 was assigned to this flaw internally by the Red Hat. please, use it in the public communications regarding this flaw. Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/4 ------------------------------------------------------------------------ On 2017-03-21T13:14:56+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0817 https://rhn.redhat.com/errata/RHSA-2017-0817.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/14 ------------------------------------------------------------------------ On 2017-08-01T19:09:29+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2077 https://access.redhat.com/errata/RHSA-2017:2077 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/15 ------------------------------------------------------------------------ On 2017-08-02T07:48:19+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1842 https://access.redhat.com/errata/RHSA-2017:1842 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/16 ------------------------------------------------------------------------ On 2017-09-06T20:38:04+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2669 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/17 ** Changed in: linux Status: Unknown => Confirmed ** Changed in: linux Importance: Unknown => Medium ** Bug watch added: Red Hat Bugzilla #1373499 https://bugzilla.redhat.com/show_bug.cgi?id=1373499 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7042 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys Status in Linux: Confirmed Status in linux package in Ubuntu: Fix Released Status in linux source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Vivid: Fix Released Status in linux source package in Xenial: Fix Released Status in linux source package in Yakkety: Fix Released Bug description: Running stress-ng /proc test trips the following crash: [ 5315.044206] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: ffffffff8956b1ae [ 5315.044206] [ 5315.044883] CPU: 0 PID: 4820 Comm: Tainted: P OE 4.8.0-25-generic #27-Ubuntu [ 5315.045361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Ubuntu-1.8.2-1ubuntu2 04/01/2014 [ 5315.045911] 0000000000000086 00000000b337622b ffff8fe574f37c78 ffffffff8962f5d2 [ 5315.046371] 00000000b3405b00 ffffffff89e83530 ffff8fe574f37d00 ffffffff8939e71c [ 5315.046841] ffff8fe500000010 ffff8fe574f37d10 ffff8fe574f37ca8 00000000b337622b [ 5315.047305] Call Trace: [ 5315.047457] [<ffffffff8962f5d2>] dump_stack+0x63/0x81 [ 5315.047763] [<ffffffff8939e71c>] panic+0xe4/0x226 [ 5315.048049] [<ffffffff8956b1ae>] ? proc_keys_show+0x3ce/0x3d0 [ 5315.048398] [<ffffffff89282b89>] __stack_chk_fail+0x19/0x30 [ 5315.048735] [<ffffffff8956b1ae>] proc_keys_show+0x3ce/0x3d0 [ 5315.049072] [<ffffffff895686b0>] ? key_validate+0x50/0x50 [ 5315.049396] [<ffffffff89565d70>] ? key_default_cmp+0x20/0x20 [ 5315.049737] [<ffffffff89459832>] seq_read+0x102/0x3c0 [ 5315.050042] [<ffffffff894a6302>] proc_reg_read+0x42/0x70 [ 5315.050363] [<ffffffff89432448>] __vfs_read+0x18/0x40 [ 5315.050674] [<ffffffff89432ba6>] vfs_read+0x96/0x130 [ 5315.050977] [<ffffffff89434085>] SyS_read+0x55/0xc0 [ 5315.051275] [<ffffffff89a9f076>] entry_SYSCALL_64_fastpath+0x1e/0xa8 [ 5315.051735] Kernel Offset: 0x8200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 5315.052563] ---[ end Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: ffffffff8956b1ae [ 5315.052563] "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file." Fix detailed in: https://bugzilla.redhat.com/show_bug.cgi?id=1373966 see: https://bugzilla.redhat.com/attachment.cgi?id=1200212&action=diff To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

