Processed: Re: Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + moreinfo
Bug #978753 [src:linux] usercopy: Kernel memory exposure attempt
Bug #978752 [src:linux] usercopy: Kernel memory exposure attempt
Added tag(s) moreinfo.
Added tag(s) moreinfo.

-- 
978752: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978752
978753: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978753
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo

Hi Markus,

Thanks for your report.

On Thu, Dec 31, 2020 at 12:45:47PM +0200, Markus Bäcklund wrote:
> Package: src:linux-image-4.19.0-13-amd64
> Version: 4.19.160-2
> Severity: critical
> Justification: breaks the whole system
> 
> 
> 
> -- Package-specific info:
> ** Kernel log: boot messages should be attached
> 
> 
> -- System Information:
> Debian Release: 10.7
>   APT prefers stable-updates
>   APT policy: (500, 'stable-updates'), (500, 'stable')
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 5.4.86 (SMP w/4 CPU cores)
> Kernel taint flags: TAINT_UNSIGNED_MODULE

5.4.86 is not a Debian kernel in buster and was tainted. Can you
please provide the kernel logs as well? This might give some better
clue.

Regards,
Salvatore



Processed: Re: Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:linux 4.19.160-2
Bug #978753 [src:linux-image-4.19.0-13-amd64] usercopy: Kernel memory exposure 
attempt
Warning: Unknown package 'src:linux-image-4.19.0-13-amd64'
Bug reassigned from package 'src:linux-image-4.19.0-13-amd64' to 'src:linux'.
No longer marked as found in versions linux-image-4.19.0-13-amd64/4.19.160-2.
Ignoring request to alter fixed versions of bug #978753 to the same values 
previously set
Bug #978753 [src:linux] usercopy: Kernel memory exposure attempt
Marked as found in versions linux/4.19.160-2.

-- 
978753: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978753
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Andrei POPESCU
Control: reassign -1 src:linux 4.19.160-2

On Jo, 31 dec 20, 12:45:47, Markus Bäcklund wrote:
> Package: src:linux-image-4.19.0-13-amd64
> Version: 4.19.160-2
> Severity: critical
> Justification: breaks the whole system
> 
> 
> 
> -- Package-specific info:
> ** Kernel log: boot messages should be attached
> 
> 
> -- System Information:
> Debian Release: 10.7
>   APT prefers stable-updates
>   APT policy: (500, 'stable-updates'), (500, 'stable')
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 5.4.86 (SMP w/4 CPU cores)
> Kernel taint flags: TAINT_UNSIGNED_MODULE
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
> LANGUAGE=en_US:en (charmap=UTF-8)
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
> 
> Versions of packages linux-image-4.19.0-13-amd64 depends on:
> ii  initramfs-tools [linux-initramfs-tool]  0.133+deb10u1
> ii  kmod26-1
> ii  linux-base  4.6
> 
> Versions of packages linux-image-4.19.0-13-amd64 recommends:
> ii  apparmor 2.13.2-10
> ii  firmware-linux-free  3.4
> 
> Versions of packages linux-image-4.19.0-13-amd64 suggests:
> pn  debian-kernel-handbook  
> ii  grub-pc 2.02+dfsg1-20+deb10u2
> pn  linux-doc-4.19  
> 
> Versions of packages linux-image-4.19.0-13-amd64 is related to:
> pn  firmware-amd-graphics 
> pn  firmware-atheros  
> pn  firmware-bnx2 
> pn  firmware-bnx2x
> pn  firmware-brcm80211
> pn  firmware-cavium   
> pn  firmware-intel-sound  
> pn  firmware-intelwimax   
> pn  firmware-ipw2x00  
> pn  firmware-ivtv 
> pn  firmware-iwlwifi  
> pn  firmware-libertas 
> pn  firmware-linux-nonfree
> pn  firmware-misc-nonfree 
> pn  firmware-myricom  
> pn  firmware-netxen   
> pn  firmware-qlogic   
> pn  firmware-realtek  
> pn  firmware-samsung  
> pn  firmware-siano
> pn  firmware-ti-connectivity  
> pn  xen-hypervisor
> 
> -- no debconf information
> 
> 
> Caused system halt with message:
> 
> usercopy: Kernel memory exposure attempt detected from SLUB object 
> 'mm_struct(770:pm2-root.service)' (offset 272, size 320)!

-- 
Looking after bugs assigned to unknown or inexistent packages


signature.asc
Description: PGP signature


Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Markus Bäcklund

Hello,

It probably was src:linux because it was in the original bug report I 
submitted a couple of minutes earlier. I included everything reportbug 
wanted me to include in the report.


I don't know if I can run the reportbug anymore, since I am now 
upgrading from 10 to 11.



Kind regards,

Markus

On 31/12/2020 13.52, Andrei POPESCU wrote:

On Jo, 31 dec 20, 12:45:47, Markus Bäcklund wrote:

Package: src:linux-image-4.19.0-13-amd64
Version: 4.19.160-2
Severity: critical
Justification: breaks the whole system
  
Hello,


What package did you specify to reportbug? I'm asking because
'src:linux-image-4.19.0-13-amd64' doesn't exist (it should be either
'linux-image-4.19.0-13-amd64' or 'src:linux').

Also the report seems to be missing some (but not all?) information
reportbug normally collects about the kernel.

Do you get a different output if you run

 reportbug linux-image-4.19.0-13-amd64

?

Kind regards,
Andrei




Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Andrei POPESCU
On Jo, 31 dec 20, 12:45:47, Markus Bäcklund wrote:
> Package: src:linux-image-4.19.0-13-amd64
> Version: 4.19.160-2
> Severity: critical
> Justification: breaks the whole system
 
Hello,

What package did you specify to reportbug? I'm asking because 
'src:linux-image-4.19.0-13-amd64' doesn't exist (it should be either 
'linux-image-4.19.0-13-amd64' or 'src:linux').

Also the report seems to be missing some (but not all?) information 
reportbug normally collects about the kernel.

Do you get a different output if you run

reportbug linux-image-4.19.0-13-amd64

?

Kind regards,
Andrei
-- 
Looking after bugs assigned to unknown or inexistent packages


signature.asc
Description: PGP signature


Bug#978753: usercopy: Kernel memory exposure attempt

2020-12-31 Thread Markus Bäcklund
Package: src:linux-image-4.19.0-13-amd64
Version: 4.19.160-2
Severity: critical
Justification: breaks the whole system



-- Package-specific info:
** Kernel log: boot messages should be attached


-- System Information:
Debian Release: 10.7
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.86 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-4.19.0-13-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.133+deb10u1
ii  kmod26-1
ii  linux-base  4.6

Versions of packages linux-image-4.19.0-13-amd64 recommends:
ii  apparmor 2.13.2-10
ii  firmware-linux-free  3.4

Versions of packages linux-image-4.19.0-13-amd64 suggests:
pn  debian-kernel-handbook  
ii  grub-pc 2.02+dfsg1-20+deb10u2
pn  linux-doc-4.19  

Versions of packages linux-image-4.19.0-13-amd64 is related to:
pn  firmware-amd-graphics 
pn  firmware-atheros  
pn  firmware-bnx2 
pn  firmware-bnx2x
pn  firmware-brcm80211
pn  firmware-cavium   
pn  firmware-intel-sound  
pn  firmware-intelwimax   
pn  firmware-ipw2x00  
pn  firmware-ivtv 
pn  firmware-iwlwifi  
pn  firmware-libertas 
pn  firmware-linux-nonfree
pn  firmware-misc-nonfree 
pn  firmware-myricom  
pn  firmware-netxen   
pn  firmware-qlogic   
pn  firmware-realtek  
pn  firmware-samsung  
pn  firmware-siano
pn  firmware-ti-connectivity  
pn  xen-hypervisor

-- no debconf information


Caused system halt with message:

usercopy: Kernel memory exposure attempt detected from SLUB object 
'mm_struct(770:pm2-root.service)' (offset 272, size 320)!