*** This bug is a duplicate of bug 1325941 ***
https://bugs.launchpad.net/bugs/1325941
** Information type changed from Public to Public Security
** Tags added: amd64 testcase
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3917
** This bug has been marked a
Attaching patch that is being sent to Kernel Team by e-mail.
** Description changed:
+ SRU Justification:
+
+ Impact: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
+ Fix: Upstream, a3c54931199565930d6d84f4c3456f6440aefd41
+ Testcase: Comment #7
+
+ Old Description:
+
I'm running
** Tags added: ua
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1302605
Title:
Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
Status in “linux” package in Ubuntu:
The following commit landed upstream that at least intends to fix the
bug outlined here, even though it does not enable proper auditing for
x32.
commit a3c54931199565930d6d84f4c3456f6440aefd41
Author: Andy Lutomirski l...@amacapital.net
Date: Wed May 28 23:09:58 2014 -0400
auditsc:
CVE-2014-3917 has been assigned to this issue: http://seclists.org/oss-
sec/2014/q2/377
Another proposed patch for this has been posted here:
http://article.gmane.org/gmane.linux.kernel/1713179 — This one adds a
guard around the array access but also drops syscall auditing for x32
calls.
** CVE
It seems that my patch was applied in the wrong place. You put it after
the 4th arg instead of after %rsi is written (easy to miss given the
vastly different assembly argument orders). We actually need to fix up
%rsi / 2nd arg syscall number and instead it is now overwritten by the
movq %rax,%rsi
Yeah, that brown paper bag was my fault. Thanks Launchpad for white-
space dammaging the patch so I hand applied it in the wrong place. Bah.
New kernels for test, with an updated patch included. If you could test
and report. Thanks.
--
You received this bug notification because you are a
Sadly we need a second patch, after which it runs stable in my testing.
I'm not into the intrinsic details of x32, but apparently the syscalls
come in through both the 64bit and 32bit paths, which I find a bit
weird. (At least my first patch made it occur significantly less often.)
Patch attached
** Tags added: patch
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1302605
Title:
Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
Status in “linux” package in Ubuntu:
** Package changed: eglibc (Ubuntu) = linux (Ubuntu)
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Ok I have applied the patch as proposed to a test kernel. Could you
test the kernels at the URL below and confirm they do fix things for
you:
http://people.canonical.com/~apw/lp1302605-trusty/
Please report any testing back here.
--
You received this bug notification because you are a
11 matches
Mail list logo