kernel-security tests fail on Wily 4.2.0-36.41
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
QA Regression Testing |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
=======
FAIL: test_021_
ASLR of libs
-------
Traceback (most recent call last):
File "./test-
self.
File "./test-
super(
File "./test-
self.
File "/home/
self.
AssertionError: Got exit code 1, expected 0
Command: './aslr', 'libs', '--verbose'
Output:
Checking ASLR of libs:
0x5558adf0
0x5558adf0
0x5558adf0
FAIL: ASLR not functional (libs always at 0x5558adf0)
All the failing tests from the log:
test_021_ aslr_dapper_ libs (__main_ _.KernelASLRm32 Tests) aslr_dapper_ mmap (__main_ _.KernelASLRm32 Tests) aslr_hardy_ vdso (__main_ _.KernelASLRm32 Tests) aslr_dapper_ libs (__main_ _.KernelASLRm32 _CVE_2016_ 3672_Tests) aslr_dapper_ mmap (__main_ _.KernelASLRm32 _CVE_2016_ 3672_Tests) aslr_hardy_ vdso (__main_ _.KernelASLRm32 _CVE_2016_ 3672_Tests)
ASLR of libs ... FAIL
test_021_
ASLR of mmap ... FAIL
test_022_
ASLR of vdso ... FAIL
test_021_
ASLR of libs ... FAIL
test_021_
ASLR of mmap ... FAIL
test_022_
ASLR of vdso ... FAIL
These tests (the gcc -m32 on amd64 versions) are all new to the QART tests in response to CVE-2016-3672, which is being addressed by the kernel in bug 1568523. The commit to fix CVE-2016-3672 (upstream 8b8addf891de8a0 0e4d39fc32f93f7 c5eb8feceb) was not incorporated in time for the 4.2.0-36.41 kernel.
With some hacky effort, I could adjust QART to not mark these as failures for the time being (and try to detect when they land via the kernel package changelog), but since the issue should be addressed in the next SRU cycle, I don't think this is a worthwhile effort. Do you concur?