Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Markus Bäcklund

Hello,

It probably was src:linux because it was in the original bug report I 
submitted a couple of minutes earlier. I included everything reportbug 
wanted me to include in the report.


I don't know if I can run the reportbug anymore, since I am now 
upgrading from 10 to 11.



Kind regards,

Markus

On 31/12/2020 13.52, Andrei POPESCU wrote:

On Jo, 31 dec 20, 12:45:47, Markus Bäcklund wrote:

Package: src:linux-image-4.19.0-13-amd64
Version: 4.19.160-2
Severity: critical
Justification: breaks the whole system
  
Hello,


What package did you specify to reportbug? I'm asking because
'src:linux-image-4.19.0-13-amd64' doesn't exist (it should be either
'linux-image-4.19.0-13-amd64' or 'src:linux').

Also the report seems to be missing some (but not all?) information
reportbug normally collects about the kernel.

Do you get a different output if you run

 reportbug linux-image-4.19.0-13-amd64

?

Kind regards,
Andrei




Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Markus Bäcklund
Package: src:linux-image-4.19.0-13-amd64
Version: 4.19.160-2
Severity: critical
Justification: breaks the whole system



-- Package-specific info:
** Kernel log: boot messages should be attached


-- System Information:
Debian Release: 10.7
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.86 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-4.19.0-13-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.133+deb10u1
ii  kmod26-1
ii  linux-base  4.6

Versions of packages linux-image-4.19.0-13-amd64 recommends:
ii  apparmor 2.13.2-10
ii  firmware-linux-free  3.4

Versions of packages linux-image-4.19.0-13-amd64 suggests:
pn  debian-kernel-handbook  
ii  grub-pc 2.02+dfsg1-20+deb10u2
pn  linux-doc-4.19  

Versions of packages linux-image-4.19.0-13-amd64 is related to:
pn  firmware-amd-graphics 
pn  firmware-atheros  
pn  firmware-bnx2 
pn  firmware-bnx2x
pn  firmware-brcm80211
pn  firmware-cavium   
pn  firmware-intel-sound  
pn  firmware-intelwimax   
pn  firmware-ipw2x00  
pn  firmware-ivtv 
pn  firmware-iwlwifi  
pn  firmware-libertas 
pn  firmware-linux-nonfree
pn  firmware-misc-nonfree 
pn  firmware-myricom  
pn  firmware-netxen   
pn  firmware-qlogic   
pn  firmware-realtek  
pn  firmware-samsung  
pn  firmware-siano
pn  firmware-ti-connectivity  
pn  xen-hypervisor

-- no debconf information


Caused system halt with message:

usercopy: Kernel memory exposure attempt detected from SLUB object 
'mm_struct(770:pm2-root.service)' (offset 272, size 320)!



Bug#978752: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Markus Bäcklund
Package: src:linux
Version: 4.19.160-2
Severity: critical
Justification: breaks the whole system



-- Package-specific info:
** Kernel log: boot messages should be attached


-- System Information:
Debian Release: 10.7
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.86 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-4.19.0-13-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.133+deb10u1
ii  kmod26-1
ii  linux-base  4.6

Versions of packages linux-image-4.19.0-13-amd64 recommends:
ii  apparmor 2.13.2-10
ii  firmware-linux-free  3.4

Versions of packages linux-image-4.19.0-13-amd64 suggests:
pn  debian-kernel-handbook  
ii  grub-pc 2.02+dfsg1-20+deb10u2
pn  linux-doc-4.19  

Versions of packages linux-image-4.19.0-13-amd64 is related to:
pn  firmware-amd-graphics 
pn  firmware-atheros  
pn  firmware-bnx2 
pn  firmware-bnx2x
pn  firmware-brcm80211
pn  firmware-cavium   
pn  firmware-intel-sound  
pn  firmware-intelwimax   
pn  firmware-ipw2x00  
pn  firmware-ivtv 
pn  firmware-iwlwifi  
pn  firmware-libertas 
pn  firmware-linux-nonfree
pn  firmware-misc-nonfree 
pn  firmware-myricom  
pn  firmware-netxen   
pn  firmware-qlogic   
pn  firmware-realtek  
pn  firmware-samsung  
pn  firmware-siano
pn  firmware-ti-connectivity  
pn  xen-hypervisor

-- no debconf information