Bug 439999 (CVE-2007-6712) - CVE-2007-6712 kernel: infinite loop in highres timers (kernel hang)
Summary: CVE-2007-6712 kernel: infinite loop in highres timers (kernel hang)
Alias: CVE-2007-6712
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 440001 440002 453136
TreeView+ depends on / blocked
Reported: 2008-04-01 10:04 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:24 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2010-12-22 23:47:25 UTC

Attachments (Terms of Use)
Testcase to reproduce the kernel hang (3.51 KB, text/x-csrc)
2008-04-01 10:09 UTC, Jan Lieskovsky
no flags Details

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0275 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2008-05-20 09:58:29 UTC
Red Hat Product Errata RHSA-2008:0585 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2008-08-26 19:56:57 UTC

Description Jan Lieskovsky 2008-04-01 10:04:53 UTC
Description of problem:

Thomas Glexner has provided patch for the following kernel issue:

hrtimer_forward() does not check for the possible overflow of
timer->expires.  This can happen on 64 bit machines with large interval
values and results currently in an endless loop in the softirq because the
expiry value becomes negative and therefor the timer is expired all the

Check for this condition and set the expiry value to the max.  expiry time
in the future.  The fix should be applied to stable kernel series as well.

Steps to reproduce:  See the next comment for the reproducer.

Actual result:    Kernel hang.

Expected result:  No kernel hang.


Proposed patch from Thomas:


Comment 9 Vincent Danen 2010-12-22 23:47:25 UTC
This was addressed via:

Red Hat Enterprise Linux version 5 (RHSA-2008:0275)
MRG Realtime for RHEL 5 Server (RHSA-2008:0585)

Note You need to log in before you can comment on or make changes to this bug.