Oh no. Had a strcat buffer overflow with 4.15.0-48-generic. Issue is NOT
solved.


Apr 29 19:29:00 kernel: [78713.491646] detected buffer overflow in strcat
Apr 29 19:29:00 kernel: [78713.491685] ------------[ cut here ]------------
Apr 29 19:29:00 kernel: [78713.491686] kernel BUG at 
/build/linux-fkZVDM/linux-4.15.0/lib/string.c:1052!
Apr 29 19:29:00 kernel: [78713.491709] invalid opcode: 0000 [#1] SMP PTI
Apr 29 19:29:00 kernel: [78713.491721] Modules linked in: ufs qnx4 hfsplus hfs 
minix ntfs msdos jfs xfs mpt3sas raid_class scsi_transport_sas mptctl mptbase 
cmac arc4 md4 nls_utf8 cifs ccm fscache dell_rbu bonding nls_iso8859_1 
intel_rapl skx_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel 
kvm joydev input_leds dell_smbios irqbypass dcdbas intel_cstate intel_rapl_perf 
ipmi_ssif wmi_bmof dell_wmi_descriptor shpchp mei_me lpc_ich ipmi_si 
ipmi_devintf ipmi_msghandler mei mac_hid acpi_power_meter sch_fq_codel ib_iser 
rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 
raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
raid1 raid0 multipath linear hid_generic crct10dif_pclmul mgag200 crc32_pclmul 
i2c_algo_bit
Apr 29 19:29:00 kernel: [78713.491911]  ghash_clmulni_intel usbhid ttm pcbc 
drm_kms_helper aesni_intel syscopyarea hid sysfillrect aes_x86_64 bnx2x 
crypto_simd sysimgblt glue_helper ptp fb_sys_fops cryptd pps_core uas drm mdio 
ahci megaraid_sas usb_storage libcrc32c libahci wmi
Apr 29 19:29:00 kernel: [78713.491975] CPU: 24 PID: 2242 Comm: perl Not tainted 
4.15.0-48-generic #51-Ubuntu
Apr 29 19:29:00 kernel: [78713.491993] Hardware name: Dell Inc. PowerEdge 
R740/0923K0, BIOS 1.6.11 11/20/2018
Apr 29 19:29:00 kernel: [78713.492014] RIP: 0010:fortify_panic+0x13/0x22
Apr 29 19:29:00 kernel: [78713.492027] RSP: 0018:ffffbb8b35b07940 EFLAGS: 
00010286
Apr 29 19:29:00 kernel: [78713.492041] RAX: 0000000000000022 RBX: 
0000000000000004 RCX: 0000000000000000
Apr 29 19:29:00 kernel: [78713.492058] RDX: 0000000000000000 RSI: 
ffff91acc0b16498 RDI: ffff91acc0b16498
Apr 29 19:29:00 kernel: [78713.492074] RBP: ffffbb8b35b07940 R08: 
0000000000000000 R09: 0000000000000681
Apr 29 19:29:00 kernel: [78713.492090] R10: ffffbb8b35b079f0 R11: 
00000000ffffffff R12: ffff91a0d3461e50
Apr 29 19:29:00 kernel: [78713.492106] R13: 0000000000000001 R14: 
0000000000000003 R15: ffff91c0acd1ac00
Apr 29 19:29:00 kernel: [78713.492123] FS:  000014ed8f19ffc0(0000) 
GS:ffff91acc0b00000(0000) knlGS:0000000000000000
Apr 29 19:29:00 kernel: [78713.492141] CS:  0010 DS: 0000 ES: 0000 CR0: 
0000000080050033
Apr 29 19:29:00 kernel: [78713.492155] CR2: 000014ed8e3ff110 CR3: 
0000000423a5c001 CR4: 00000000007606e0
Apr 29 19:29:00 kernel: [78713.492171] DR0: 0000000000000000 DR1: 
0000000000000000 DR2: 0000000000000000
Apr 29 19:29:00 kernel: [78713.492187] DR3: 0000000000000000 DR6: 
00000000fffe0ff0 DR7: 0000000000000400
Apr 29 19:29:00 kernel: [78713.492203] PKRU: 55555554
Apr 29 19:29:00 kernel: [78713.492210] Call Trace:
Apr 29 19:29:00 kernel: [78713.492241]  smb21_set_oplock_level+0x147/0x1a0 
[cifs]
Apr 29 19:29:00 kernel: [78713.492265]  smb3_set_oplock_level+0x22/0x90 [cifs]
Apr 29 19:29:00 kernel: [78713.492285]  smb2_set_fid+0x76/0xb0 [cifs]
Apr 29 19:29:00 kernel: [78713.492303]  cifs_new_fileinfo+0x259/0x390 [cifs]
Apr 29 19:29:00 kernel: [78713.492321]  ? smb2_get_lease_key+0x40/0x40 [cifs]
Apr 29 19:29:00 kernel: [78713.492338]  ? cifs_new_fileinfo+0x259/0x390 [cifs]
Apr 29 19:29:00 kernel: [78713.492355]  cifs_open+0x3db/0x8d0 [cifs]
Apr 29 19:29:00 kernel: [78713.492370]  do_dentry_open+0x1c2/0x310
Apr 29 19:29:00 kernel: [78713.492384]  ? 
cifs_uncached_writev_complete+0x3f0/0x3f0 [cifs]
Apr 29 19:29:00 kernel: [78713.492399]  ? do_dentry_open+0x1c2/0x310
Apr 29 19:29:00 kernel: [78713.492411]  ? __inode_permission+0x5b/0x160
Apr 29 19:29:00 kernel: [78713.492427]  ? 
cifs_uncached_writev_complete+0x3f0/0x3f0 [cifs]
Apr 29 19:29:00 kernel: [78713.492441]  vfs_open+0x4f/0x80
Apr 29 19:29:00 kernel: [78713.492451]  path_openat+0x66e/0x1770
Apr 29 19:29:00 kernel: [78713.492464]  ? mem_cgroup_commit_charge+0x82/0x530
Apr 29 19:29:00 kernel: [78713.492477]  do_filp_open+0x9b/0x110
Apr 29 19:29:00 kernel: [78713.492489]  ? _cond_resched+0x19/0x40
Apr 29 19:29:00 kernel: [78713.493055]  ? __kmalloc+0x19b/0x220
Apr 29 19:29:00 kernel: [78713.493574]  ? security_prepare_creds+0x9c/0xc0
Apr 29 19:29:00 kernel: [78713.494088]  do_open_execat+0x7e/0x1e0
Apr 29 19:29:00 kernel: [78713.494595]  ? prepare_creds+0xd5/0x110
Apr 29 19:29:00 kernel: [78713.495095]  ? do_open_execat+0x7e/0x1e0
Apr 29 19:29:00 kernel: [78713.495590]  do_execveat_common.isra.34+0x1c7/0x810
Apr 29 19:29:00 kernel: [78713.496074]  SyS_execve+0x31/0x40
Apr 29 19:29:00 kernel: [78713.496542]  do_syscall_64+0x73/0x130
Apr 29 19:29:00 kernel: [78713.496997]  entry_SYSCALL_64_after_hwframe+0x3d/0xa2
Apr 29 19:29:00 kernel: [78713.497443] RIP: 0033:0x14ed8e4c2e37
Apr 29 19:29:00 kernel: [78713.497869] RSP: 002b:00007fff2f69b008 EFLAGS: 
00000202 ORIG_RAX: 000000000000003b
Apr 29 19:29:00 kernel: [78713.498295] RAX: ffffffffffffffda RBX: 
000055f4354b9be0 RCX: 000014ed8e4c2e37
Apr 29 19:29:00 kernel: [78713.498711] RDX: 000055f429d70cf0 RSI: 
000055f4354b9be0 RDI: 000055f434e0b1b0
Apr 29 19:29:00 kernel: [78713.499111] RBP: 00007fff2f69b0a0 R08: 
00007fff2f69b0c0 R09: 000014ed8e9e92b0
Apr 29 19:29:00 kernel: [78713.499500] R10: 0000000000000008 R11: 
0000000000000202 R12: 000055f429d70cf0
Apr 29 19:29:00 kernel: [78713.499876] R13: 000055f42971bc00 R14: 
000055f4353076f0 R15: 000055f434e0b1b0
Apr 29 19:29:00 kernel: [78713.500248] Code: e0 4c 89 e2 e8 41 6a 00 00 42 c6 
04 20 00 48 89 d8 5b 41 5c 5d c3 0f 0b 55 48 89 fe 48 c7 c7 c8 90 7a 8d 48 89 
e5 e8 0f 5c 76 ff <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 55 31 c9 48 89 
fa
Apr 29 19:29:00 kernel: [78713.501047] RIP: fortify_panic+0x13/0x22 RSP: 
ffffbb8b35b07940
Apr 29 19:29:00 kernel: [78713.501459] ---[ end trace 111788531b53b6f2 ]---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824981

Title:
  cifs set_oplock buffer overflow in strcat

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824981/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to