Processed: Re: Bug#978753: usercopy: Kernel memory exposure attempt
Processing control commands: > tags -1 + moreinfo Bug #978753 [src:linux] usercopy: Kernel memory exposure attempt Bug #978752 [src:linux] usercopy: Kernel memory exposure attempt Added tag(s) moreinfo. Added tag(s) moreinfo. -- 978752: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978752 978753: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978753 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#978753: usercopy: Kernel memory exposure attempt
Control: tags -1 + moreinfo Hi Markus, Thanks for your report. On Thu, Dec 31, 2020 at 12:45:47PM +0200, Markus Bäcklund wrote: > Package: src:linux-image-4.19.0-13-amd64 > Version: 4.19.160-2 > Severity: critical > Justification: breaks the whole system > > > > -- Package-specific info: > ** Kernel log: boot messages should be attached > > > -- System Information: > Debian Release: 10.7 > APT prefers stable-updates > APT policy: (500, 'stable-updates'), (500, 'stable') > Architecture: amd64 (x86_64) > > Kernel: Linux 5.4.86 (SMP w/4 CPU cores) > Kernel taint flags: TAINT_UNSIGNED_MODULE 5.4.86 is not a Debian kernel in buster and was tainted. Can you please provide the kernel logs as well? This might give some better clue. Regards, Salvatore
Processed: Re: Bug#978753: usercopy: Kernel memory exposure attempt
Processing control commands: > reassign -1 src:linux 4.19.160-2 Bug #978753 [src:linux-image-4.19.0-13-amd64] usercopy: Kernel memory exposure attempt Warning: Unknown package 'src:linux-image-4.19.0-13-amd64' Bug reassigned from package 'src:linux-image-4.19.0-13-amd64' to 'src:linux'. No longer marked as found in versions linux-image-4.19.0-13-amd64/4.19.160-2. Ignoring request to alter fixed versions of bug #978753 to the same values previously set Bug #978753 [src:linux] usercopy: Kernel memory exposure attempt Marked as found in versions linux/4.19.160-2. -- 978753: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978753 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#978753: usercopy: Kernel memory exposure attempt
Control: reassign -1 src:linux 4.19.160-2 On Jo, 31 dec 20, 12:45:47, Markus Bäcklund wrote: > Package: src:linux-image-4.19.0-13-amd64 > Version: 4.19.160-2 > Severity: critical > Justification: breaks the whole system > > > > -- Package-specific info: > ** Kernel log: boot messages should be attached > > > -- System Information: > Debian Release: 10.7 > APT prefers stable-updates > APT policy: (500, 'stable-updates'), (500, 'stable') > Architecture: amd64 (x86_64) > > Kernel: Linux 5.4.86 (SMP w/4 CPU cores) > Kernel taint flags: TAINT_UNSIGNED_MODULE > Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), > LANGUAGE=en_US:en (charmap=UTF-8) > Shell: /bin/sh linked to /usr/bin/dash > Init: systemd (via /run/systemd/system) > LSM: AppArmor: enabled > > Versions of packages linux-image-4.19.0-13-amd64 depends on: > ii initramfs-tools [linux-initramfs-tool] 0.133+deb10u1 > ii kmod26-1 > ii linux-base 4.6 > > Versions of packages linux-image-4.19.0-13-amd64 recommends: > ii apparmor 2.13.2-10 > ii firmware-linux-free 3.4 > > Versions of packages linux-image-4.19.0-13-amd64 suggests: > pn debian-kernel-handbook > ii grub-pc 2.02+dfsg1-20+deb10u2 > pn linux-doc-4.19 > > Versions of packages linux-image-4.19.0-13-amd64 is related to: > pn firmware-amd-graphics > pn firmware-atheros > pn firmware-bnx2 > pn firmware-bnx2x > pn firmware-brcm80211 > pn firmware-cavium > pn firmware-intel-sound > pn firmware-intelwimax > pn firmware-ipw2x00 > pn firmware-ivtv > pn firmware-iwlwifi > pn firmware-libertas > pn firmware-linux-nonfree > pn firmware-misc-nonfree > pn firmware-myricom > pn firmware-netxen > pn firmware-qlogic > pn firmware-realtek > pn firmware-samsung > pn firmware-siano > pn firmware-ti-connectivity > pn xen-hypervisor > > -- no debconf information > > > Caused system halt with message: > > usercopy: Kernel memory exposure attempt detected from SLUB object > 'mm_struct(770:pm2-root.service)' (offset 272, size 320)! -- Looking after bugs assigned to unknown or inexistent packages signature.asc Description: PGP signature
Bug#978753: usercopy: Kernel memory exposure attempt
Hello, It probably was src:linux because it was in the original bug report I submitted a couple of minutes earlier. I included everything reportbug wanted me to include in the report. I don't know if I can run the reportbug anymore, since I am now upgrading from 10 to 11. Kind regards, Markus On 31/12/2020 13.52, Andrei POPESCU wrote: On Jo, 31 dec 20, 12:45:47, Markus Bäcklund wrote: Package: src:linux-image-4.19.0-13-amd64 Version: 4.19.160-2 Severity: critical Justification: breaks the whole system Hello, What package did you specify to reportbug? I'm asking because 'src:linux-image-4.19.0-13-amd64' doesn't exist (it should be either 'linux-image-4.19.0-13-amd64' or 'src:linux'). Also the report seems to be missing some (but not all?) information reportbug normally collects about the kernel. Do you get a different output if you run reportbug linux-image-4.19.0-13-amd64 ? Kind regards, Andrei
Bug#978753: usercopy: Kernel memory exposure attempt
On Jo, 31 dec 20, 12:45:47, Markus Bäcklund wrote: > Package: src:linux-image-4.19.0-13-amd64 > Version: 4.19.160-2 > Severity: critical > Justification: breaks the whole system Hello, What package did you specify to reportbug? I'm asking because 'src:linux-image-4.19.0-13-amd64' doesn't exist (it should be either 'linux-image-4.19.0-13-amd64' or 'src:linux'). Also the report seems to be missing some (but not all?) information reportbug normally collects about the kernel. Do you get a different output if you run reportbug linux-image-4.19.0-13-amd64 ? Kind regards, Andrei -- Looking after bugs assigned to unknown or inexistent packages signature.asc Description: PGP signature
Bug#978753: usercopy: Kernel memory exposure attempt
Package: src:linux-image-4.19.0-13-amd64 Version: 4.19.160-2 Severity: critical Justification: breaks the whole system -- Package-specific info: ** Kernel log: boot messages should be attached -- System Information: Debian Release: 10.7 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.4.86 (SMP w/4 CPU cores) Kernel taint flags: TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages linux-image-4.19.0-13-amd64 depends on: ii initramfs-tools [linux-initramfs-tool] 0.133+deb10u1 ii kmod26-1 ii linux-base 4.6 Versions of packages linux-image-4.19.0-13-amd64 recommends: ii apparmor 2.13.2-10 ii firmware-linux-free 3.4 Versions of packages linux-image-4.19.0-13-amd64 suggests: pn debian-kernel-handbook ii grub-pc 2.02+dfsg1-20+deb10u2 pn linux-doc-4.19 Versions of packages linux-image-4.19.0-13-amd64 is related to: pn firmware-amd-graphics pn firmware-atheros pn firmware-bnx2 pn firmware-bnx2x pn firmware-brcm80211 pn firmware-cavium pn firmware-intel-sound pn firmware-intelwimax pn firmware-ipw2x00 pn firmware-ivtv pn firmware-iwlwifi pn firmware-libertas pn firmware-linux-nonfree pn firmware-misc-nonfree pn firmware-myricom pn firmware-netxen pn firmware-qlogic pn firmware-realtek pn firmware-samsung pn firmware-siano pn firmware-ti-connectivity pn xen-hypervisor -- no debconf information Caused system halt with message: usercopy: Kernel memory exposure attempt detected from SLUB object 'mm_struct(770:pm2-root.service)' (offset 272, size 320)!