Activity log for bug #1844155

Date Who What changed Old value New value Message
2019-09-16 14:47:19 Adam Conrad bug added bug
2019-09-16 14:47:36 Adam Conrad bug watch added https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904385
2019-09-16 14:47:36 Adam Conrad bug task added linux (Debian)
2019-09-16 14:53:19 Andy Whitcroft linux (Ubuntu): status New Confirmed
2019-09-16 16:03:22 Bug Watch Updater linux (Debian): status Unknown Fix Released
2019-10-01 09:02:57 Kleber Sacilotto de Souza nominated for series Ubuntu Xenial
2019-10-01 09:02:57 Kleber Sacilotto de Souza bug task added linux (Ubuntu Xenial)
2019-10-01 09:03:05 Kleber Sacilotto de Souza linux (Ubuntu Xenial): status New Confirmed
2019-10-01 17:53:02 Juerg Haefliger description This seems to have been fixed in 4.15 (finally), but is still an issue in the 4.4 kernel used on our builders, and possibly others as well (needs investigation). The original Debian bug report linked has more info, as well as the patchset on lkml at https://lkml.org/lkml/2018/7/25/409 [Impact] The arm64 kernel allows one to run aarch32 processes on an aarch64 processor, using the standard 32/64-bit syscall compatibility. However this compat layer does not correctly validate the arguments of the sigaltstack syscall which can result in process failures. [Test Case] The simple reproducer from https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904385 triggers a memory allocation error with the current Xenial 4.4 kernel. [Fix] Backport the following two upstream commits: 24951465cbd2 arm64: compat: Provide definition for COMPAT_SIGMINSTKSZ 22839869f21a signal: Introduce COMPAT_SIGMINSTKSZ for use in compat_sys_sigaltstack With these two commits, the reproducer no longer fails. [Regression Potential] Low. the modifications are trivial and the two patches have been in upstream for quite a while. [Original Description] This seems to have been fixed in 4.15 (finally), but is still an issue in the 4.4 kernel used on our builders, and possibly others as well (needs investigation). The original Debian bug report linked has more info, as well as the patchset on lkml at https://lkml.org/lkml/2018/7/25/409
2019-10-21 17:36:26 Khaled El Mously linux (Ubuntu Xenial): status Confirmed Fix Committed
2019-10-22 16:04:40 Ubuntu Kernel Bot tags verification-needed-xenial
2019-11-07 08:15:55 Adam Conrad tags verification-needed-xenial verification-done-xenial
2019-11-07 08:17:10 Adam Conrad linux (Ubuntu): status Confirmed Fix Released
2019-11-12 22:33:58 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2019-11-12 22:33:58 Launchpad Janitor cve linked 2018-12207
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-0154
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-0155
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-11135
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-15098
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-17052
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-17053
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-17054
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-17055
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-17056
2019-11-12 22:33:58 Launchpad Janitor cve linked 2019-17666