[Group.of.nepali.translators] [Bug 1884766] Re: use-after-free in af_alg_accept() due to bh_lock_sock()

2020-06-30 Thread Mauricio Faria de Oliveira
** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

** Changed in: linux (Ubuntu Groovy)
   Status: Confirmed => Won't Fix

** Changed in: linux (Ubuntu Groovy)
   Importance: Medium => Undecided

** Changed in: linux (Ubuntu Groovy)
 Assignee: Mauricio Faria de Oliveira (mfo) => (unassigned)

** Changed in: linux (Ubuntu)
   Status: Confirmed => In Progress

** Description changed:

  [Impact]
  
   * Users of the Linux kernel's crypto userspace API
     reported BUG() / kernel NULL pointer dereference
     errors after kernel upgrades.
  
   * The stack trace signature is an accept() syscall
     going through af_alg_accept() and hitting errors
     usually in one of:
     - apparmor_sk_clone_security()
     - apparmor_sock_graft()
     - release_sock()
  
  [Fix]
  
   * This is a regression introduced by upstream commit
     37f96694cf73 ("crypto: af_alg - Use bh_lock_sock
     in sk_destruct") which made its way through stable.
  
   * The offending patch allows the critical regions
     of af_alg_accept() and af_alg_release_parent() to
     run concurrently; now with the "right" events on 2
     CPUs it might drop the non-atomic reference counter
     of the alg_sock then the sock, thus release a sock
     that is still in use.
  
   * The fix is upstream commit 34c86f4c4a7b ("crypto:
     af_alg - fix use-after-free in af_alg_accept() due
     to bh_lock_sock()") [1]. It changes alg_sock's ref
     counter to atomic, which addresses the root cause.
  
  [Test Case]
  
   * There is a synthetic test case available, which
     uses a kprobes kernel module to synchronize the
     concurrent CPUs on the instructions responsible
     for the problem; and a userspace part to run it.
  
   * The organic reproducer is the Varnish Cache Plus
     software with the Crypto vmod (which uses kernel
     crypto userspace API) under long, very high load.
  
   * The patch has been verified on both reproducers
     with the 4.15 and 5.7 kernels.
  
-  * More tests performed with 'stress-ng --af-alg'
-with 11 CPUs on Xenial/Bionic/Disco/Eoan/Focal
-(all on same version of stress-ng, V0.11.14)
+  * More tests performed with 'stress-ng --af-alg'
+    with 11 CPUs on Xenial/Bionic/Disco/Eoan/Focal
+    (all on same version of stress-ng, V0.11.14)
  
-No regressions observed from original kernel.
-(the af-alg stressor can exercise almost all
-kernel crypto modules shipped with the kernel;
-so it checks more paths/crypto alg interfaces.)
+    No regressions observed from original kernel.
+    (the af-alg stressor can exercise almost all
+    kernel crypto modules shipped with the kernel;
+    so it checks more paths/crypto alg interfaces.)
  
  [Regression Potential]
  
   * The fix patch does a fundamental change in how
     alg_sock reference counters work, plus another
     change to the 'nokey' counting. This of course
     *has* a risk of regression.
  
   * Regressions theoretically could manifest as use
     after free errors (in case of undercounting) in
     the af_alg functions or silent memory leaks (in
     case of overcounting), but also other behaviors
     since reference counting is key to many things.
  
   * FWIW, this patch has been written by the crypto
     subsystem maintainer, who certainly knows a lot
     of the normal and corner cases, thus giving the
     patch more credit.
  
   * Testing with the organic reproducer ran as long
     as 5 days, without issues, so it does look good.
  
  [Other Info]
+ 
+  * Not sending for Groovy (should get via Unstable).
  
   * [1] Patch:
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34c86f4c4a7be3b3e35aa48bd18299d4c756064d
  
  [Stack Trace Examples]
  
  Examples:
  
  BUG: unable to handle kernel NULL pointer dereference at 
  ...
  RIP: 0010:apparmor_sk_clone_security+0x26/0x70
  ...
  Call Trace:
   security_sk_clone+0x33/0x50
   af_alg_accept+0x81/0x1c0 [af_alg]
   alg_accept+0x15/0x20 [af_alg]
   SYSC_accept4+0xff/0x210
 

[Group.of.nepali.translators] [Bug 1885055] Re: xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker

2020-06-30 Thread Marcelo Cerri
Flipping the ADT test manually based on previous version and no
outstanding issues on the current run.

** Changed in: kernel-sru-workflow/automated-testing
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885055

Title:
  xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-azure source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885057
  packages:
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Testing
  phase-changed: Saturday, 27. June 2020 15:15 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-azure/azure-kernel: bug 1885054
  variant: debs
  versions:
main: 4.15.0-1091.101~16.04.1
meta: 4.15.0.1091.86
signed: 4.15.0-1091.101~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885055/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882764] Re: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker

2020-06-30 Thread Marcelo Cerri
Flipping the ADT test manually based on previous version and no
outstanding issues on the current run.

** Changed in: kernel-sru-workflow/automated-testing
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882764

Title:
  xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  In Progress
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-raspi2 source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Testing
  phase-changed: Sunday, 28. June 2020 13:56 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-raspi2/pi2-kernel: bug 1882763
  variant: debs
  versions:
main: 4.4.0-1135.144
meta: 4.4.0.1135.135

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882764/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1580731] Re: augeas-lenses filter for PHP files doesn't match php7.0-* files

2020-06-30 Thread Robie Basak
Following a discussion with Bryce earlier, on behalf of the SRU team I'm
declining this SRU and mark it Won't Fix.

It might have been relevant to fix in Xenial at the time, but the bug
has now been fixed in newer releases including in two newer LTS
releases. The benefit to Xenial users seems minimal now, especially as
not a single user has stepped up to test Jon's proposed fix in four
years.

As the impact on users on Xenial therefore appears to be zero, I don't
think it's appropriate to SRU this now, when balanced against the
regression risk of toolchain changes mutating a rebuild. If the
situation changes and users do appear who are affected, then we can
reconsider.

Note that I've not considered any other factors. If users are affected,
an appropriate answer may still be to upgrade rather than SRUing this
fix.

** Changed in: augeas (Ubuntu Xenial)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1580731

Title:
  augeas-lenses filter for PHP files doesn't match php7.0-* files

Status in augeas package in Ubuntu:
  Fix Released
Status in augeas source package in Xenial:
  Won't Fix

Bug description:
  [Impact]

  Automation of configuration editing cannot be done for PHP
  installations on Xenial using augeas.  The location of php
  configuration files moved in php7, to a directory augeas doesn't look
  in.

  [Test Case]

- Create lxc container
$ sudo apt-get install php7.0-cli
$ sudo apt-get install augeas-lenses augeas-tools
$ augtool ls /files/etc/php
## (no output)
- Add the PPA
$ augtool ls /files/etc/php
7.0/ = (none)

  
  [Regression Potential]

  Since this makes the PHP configuration accessible to augeas where it
  wasn't before, behaviors to watch for would relate to php
  configuration issues when augeas (or puppet) are in use.  It is
  expected that by now most administrators will have worked around the
  problem by using some other method to configure php, so it is unlikely
  users would experience behavior regression.

  
  [Fix]

  This adds the "/etc/php/*/*/*.ini" path to the php lense for augeas,
  following what upstream has done, and that we carry in newer versions of
  Ubuntu.

  
  [Discussion]

  While it is true that Xenial is old at this point, enterprises that use
  configuration automation software like augeas sometimes still need older
  versions of Ubuntu (e.g. via ESM).  PHP has been a popular choice for
  many enterprises in the past, so it is expected that PHP 5 -> 7.0
  upgrades are still relevant.  So, given that, plus the simplicity of
  this fix it seems still worthy of SRU.

  
  [Original Report]

  The filter list in /usr/share/augeas/lenses/dist/php.aug includes:
  /etc/php*/*/*.ini
  /etc/php*/fpm/pool.d/*.conf

  This will match the php5-fpm package files:
  /etc/php5/fpm/php.ini
  /etc/php5/fpm/pool.d/*.conf

  But not the php7.0-fpm package files:
  /etc/php/7.0/fpm/php.ini
  /etc/php/7.0/fpm/pool.d/*.conf

  Puppet handles this badly because augeas won't report that anything
  has changed trying to set options in /etc/php/7.0/fpm/php.ini, so it
  does nothing instead of reporting an error:

  Debug: Augeas[php_sessions](provider=augeas): Will attempt to save and only 
run if files changed
  Debug: Augeas[php_sessions](provider=augeas): sending command 'set' with 
params ["/files/etc/php/7.0/fpm/php.ini/Session/session.gc_maxlifetime", 
"604800"]
  Debug: Augeas[php_sessions](provider=augeas): Skipping because no files were 
changed
  Debug: Augeas[php_sessions](provider=augeas): Closed the augeas connection

  augeas-lenses:
    Installed: 1.4.0-0ubuntu1
    Candidate: 1.4.0-0ubuntu1
    Version table:
   *** 1.4.0-0ubuntu1 500
  500 http://gb.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
  500 http://gb.archive.ubuntu.com/ubuntu xenial/main i386 Packages
  100 /var/lib/dpkg/status

  php7.0-fpm:
    Installed: 7.0.4-7ubuntu2ppa1
    Candidate: 7.0.4-7ubuntu2ppa1
    Version table:
   *** 7.0.4-7ubuntu2ppa1 1000
     1000 http://ppa.launchpad.net/sa.me.uk/um/ubuntu xenial/main amd64 
Packages
  100 /var/lib/dpkg/status
   7.0.4-7ubuntu2 500
  500 http://gb.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/augeas/+bug/1580731/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp