Hardy Xen i386 DomU: CONFIG_COMPAT_VDSO disabled

Bug #794715 reported by C de-Avillez
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Invalid
Undecided
Unassigned
Hardy
Fix Released
Medium
Stefan Bader

Bug Description

SRU Justification:

Impact: The COMPAT_VDSO option will cause the VDSO segment (32bit) to appear also at its old, non-randomized place. It is only required for older libc versions. 10.04 already is at a newer level and the generic build has it turned off.

Fix: Turn the option off for the custom-binary-xen (i386) build as well.

Testcase: QA regression testing will fail with this option turned on. Verified it is running successfully in a Hardy VM using the -xen kernel in dom0, as well as running it as domU on EC2 (m1.small).

---

Release of Ubuntu: Hardy
Package Version: 2.6.24-29.90
Expected Results:
Actual Results: http://reports.qa.ubuntu.com/reports/kernel-sru/home/ubuntu/sru-kernel-test/hardy-2.6.24-29.90/m1.small-i386/qrt-kernel-security.txt

Stefan Bader (smb)
description: updated
Andy Whitcroft (apw)
Changed in linux (Ubuntu):
status: New → Invalid
Changed in linux (Ubuntu Hardy):
status: New → In Progress
assignee: nobody → Stefan Bader (stefan-bader-canonical)
Revision history for this message
Stefan Bader (smb) wrote :
Stefan Bader (smb)
Changed in linux (Ubuntu Hardy):
importance: Undecided → Medium
status: In Progress → Fix Committed
Revision history for this message
Herton R. Krzesinski (herton) wrote :

This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-hardy' to 'verification-done-hardy'.

If verification is not done by one week from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-hardy
Revision history for this message
Stefan Bader (smb) wrote :

Running test: './test-kernel-security.py' distro: 'Ubuntu 8.04' kernel: '2.6.24-
29.91 (Ubuntu 2.6.24-29.91-xen)' arch: 'i386' uid: 0/0 SUDO_USER: 'test')
Build helper tools ... (4.2.4 (Ubuntu 4.2.4-1ubuntu4)) ok
...
CONFIG_SECCOMP enabled ... ok
CONFIG_COMPAT_VDSO disabled ... ok
CONFIG_DEBUG_RODATA enabled ... (skipped: ignored on Hardy Xen) ok
...

tags: added: verification-done-hardy
removed: verification-needed-hardy
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 2.6.24-29.91

---------------
linux (2.6.24-29.91) hardy-proposed; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
    - LP: #801636

  [Andy Whitcroft]

  * custom binaries need VERSION_SIGNATURE updated during prepare
    - LP: #794698

  [Stefan Bader]

  * (config) Disable COMPAT_VDSO for i386 Xen kernels
    - LP: #794715
  * XEN: Add yield points to blktap and blkback
    - LP: #791212
    - CVE-2010-4247
  * xen: Fix memory corruption caused by double free
    - LP: #705562

  [Upstream Kernel Changes]

  * agp: fix arbitrary kernel memory writes, CVE-1011-2022
    - LP: #788684
    - CVE-1011-2022
  * agp: fix OOM and buffer overflow
    - LP: #791918
    - CVE-2011-1746
  * tty: icount changeover for other main devices, CVE-2010-4076,
    CVE-2010-4077
    - LP: #794034
    - CVE-2010-4077
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
    oops
    - LP: #795418
    - CVE-2011-1577
  * Fix corrupted OSF partition table parsing
    - LP: #796606
    - CVE-2011-1163
  * proc: avoid information leaks to non-privileged processes
    - LP: #799906
    - CVE-2011-0726
  * proc: protect mm start_code/end_code in /proc/pid/stat
    - LP: #799906
    - CVE-2011-0726
  * sctp: Fix a race between ICMP protocol unreachable and connect()
    - LP: #799828
    - CVE-2010-4526
  * xen: blkback, blktap: Fix potential resource leak
    - LP: #800254
 -- Steve Conklin <email address hidden> Fri, 24 Jun 2011 10:59:11 -0500

Changed in linux (Ubuntu Hardy):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.