Bug 757143 (CVE-2011-4348) - CVE-2011-4348 kernel: incomplete fix for CVE-2011-2482
Summary: CVE-2011-4348 kernel: incomplete fix for CVE-2011-2482
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-4348
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 757146
Blocks: 731905
TreeView+ depends on / blocked
 
Reported: 2011-11-25 15:14 UTC by Petr Matousek
Modified: 2021-02-24 13:43 UTC (History)
14 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-05-10 08:10:09 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0007 0 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2012-01-11 01:02:46 UTC

Description Petr Matousek 2011-11-25 15:14:02 UTC
When testing [CVE-2011-2482] with SELinux disabled (haven't triggered panic on
patched kernel with selinux on), the reproducer run after regular user causes
soft lookups and the machine becomes completely unresponsive on patched kernel.
Target machine was unresponsive after remote part of reproducer (con) killed.
Target with patched kernel needed to be rebooted to start working regularly. 

[root@intel-mahobay-01 ~]# setenforce 0
[test@intel-mahobay-01 ~]$ uname -r
2.6.18-238.30.1.el5
[test@intel-mahobay-01 ~]$ for i in 3333 3334 3335 3336; do
> ./acc -a 1 -p $i -K -k 10000 -K -F 1 -R -U -W & done
[test@intel-mahobay-01 ~]$ BUG: soft lockup - CPU#2 stuck for 60s! [acc:5861]
CPU 2:
Modules linked in: md5 sctp autofs4 hidp rfcomm l2cap bluetooth lockd sunrpc
cpufreq_ondemand acpi_cpufreq freq_table mperf be2iscsi ib_iser rdma_cm ib_cm
iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic ipv6 xfrm_nalgo
crypto_api uio cxgb3i cxgb3 libiscsi_tcp libiscsi2 scsi_transport_iscsi2
scsi_transport_iscsi loop dm_multipath scsi_dh video backlight sbs power_meter
hwmon i2c_ec i2c_core dell_wmi wmi button battery asus_acpi acpi_memhotplug ac
lp sr_mod cdrom parport_serial sg e1000e parport_pc shpchp igb parport 8021q
tpm_tis dca tpm pcspkr tpm_bios dm_raid45 dm_message dm_region_hash
dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ahci libata sd_mod
scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
Pid: 5861, comm: acc Not tainted 2.6.18-238.30.1.el5 #1
RIP: 0010:[<ffffffff80064be3>]  [<ffffffff80064be3>]
.text.lock.spinlock+0x29/0x30
RSP: 0018:ffff810139751dc8  EFLAGS: 00000282
RAX: ffff810139751fd8 RBX: 0000000000000000 RCX: ffff81013a7660d0
RDX: ffff81014daa38d0 RSI: ffff81014daa38d0 RDI: ffff810139dd89c0
RBP: ffff810139e82e00 R08: ffff810146e56700 R09: 0000000000000000
R10: ffff810139751b68 R11: ffff81013a352000 R12: 0000000000000292
R13: ffff81014daa38a8 R14: ffffffff88671ba7 R15: 0000000000000296
FS:  00002aaed65086e0(0000) GS:ffff81014e4ffe40(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00007fff136a7c40 CR3: 000000013a3a6000 CR4: 00000000000006e0

Call Trace:
 [<ffffffff80064ae9>] _spin_lock_bh+0x9/0x14
 [<ffffffff80030fe6>] release_sock+0x13/0xc1
 [<ffffffff8867f048>] :sctp:sctp_accept+0x1b7/0x1d0
 [<ffffffff800a2884>] autoremove_wake_function+0x0/0x2e
 [<ffffffff8026822a>] inet_accept+0x25/0xcb
 [<ffffffff8022b938>] sys_accept+0x11c/0x1ea
 [<ffffffff80030fe6>] release_sock+0x13/0xc1
 [<ffffffff8022d9cb>] sock_setsockopt+0x4d3/0x4e5
 [<ffffffff800b95d4>] audit_syscall_entry+0x1a4/0x1cf
 [<ffffffff8005d28d>] tracesys+0xd5/0xe0

BUG: soft lockup - CPU#7 stuck for 60s! [ksoftirqd/7:24]
CPU 7:
Modules linked in: md5 sctp autofs4 hidp rfcomm l2cap bluetooth lockd sunrpc
cpufreq_ondemand acpi_cpufreq freq_table mperf be2iscsi ib_iser rdma_cm ib_cm
iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic ipv6 xfrm_nalgo
crypto_api uio cxgb3i cxgb3 libiscsi_tcp libiscsi2 scsi_transport_iscsi2
scsi_transport_iscsi loop dm_multipath scsi_dh video backlight sbs power_meter
hwmon i2c_ec i2c_core dell_wmi wmi button battery asus_acpi acpi_memhotplug ac
lp sr_mod cdrom parport_serial sg e1000e parport_pc shpchp igb parport 8021q
tpm_tis dca tpm pcspkr tpm_bios dm_raid45 dm_message dm_region_hash
dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ahci libata sd_mod
scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
Pid: 24, comm: ksoftirqd/7 Not tainted 2.6.18-238.30.1.el5 #1
RIP: 0010:[<ffffffff80064bbf>]  [<ffffffff80064bbf>]
.text.lock.spinlock+0x5/0x30
RSP: 0018:ffff810104a6fcb0  EFLAGS: 00000282
RAX: 0000000000000000 RBX: ffff81014717c480 RCX: 0000000000000000
RDX: ffff810139e05d60 RSI: ffff810104a6fd14 RDI: ffff810139dd89c0
RBP: ffff810104a6fc30 R08: ffff810139e05cc0 R09: 0000000000000000
R10: ffff810139e05cc0 R11: 00000000000000f8 R12: ffffffff8005dc8e
R13: ffff810139e05cc0 R14: ffffffff80078f1d R15: ffff810104a6fc30
FS:  0000000000000000(0000) GS:ffff81014e59e340(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00007fff136a7c34 CR3: 0000000000201000 CR4: 00000000000006e0

Call Trace:
 <IRQ>  [<ffffffff8868093c>] :sctp:sctp_rcv+0x61e/0x7ba
 [<ffffffff8008f355>] scheduler_tick+0xc3/0x35f
 [<ffffffff80034b1e>] ip_local_deliver+0x19d/0x263
 [<ffffffff80035c7a>] ip_rcv+0x539/0x57c
 [<ffffffff80020bdc>] netif_receive_skb+0x470/0x49f
 [<ffffffff8823ebfb>] :e1000e:e1000_receive_skb+0x1b5/0x1d6
 [<ffffffff8824390d>] :e1000e:e1000_clean_rx_irq+0x271/0x318
 [<ffffffff88241abc>] :e1000e:e1000_clean+0x7c/0x29b
 [<ffffffff8000ca35>] net_rx_action+0xac/0x1b3
 [<ffffffff80012537>] __do_softirq+0x89/0x133
 [<ffffffff8005e2fc>] call_softirq+0x1c/0x28
 <EOI>  [<ffffffff80096395>] ksoftirqd+0x0/0xbf
 [<ffffffff8006d5f5>] do_softirq+0x2c/0x7d
 [<ffffffff800963f4>] ksoftirqd+0x5f/0xbf
 [<ffffffff80032b28>] kthread+0xfe/0x132
 [<ffffffff8005dfb1>] child_rip+0xa/0x11
 [<ffffffff80032a2a>] kthread+0x0/0x132
 [<ffffffff8005dfa7>] child_rip+0x0/0x11

Comment 3 Vincent Danen 2012-01-10 18:26:08 UTC
Statement:

This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6 and Red Hat Enterprise MRG as they were not vulnerable to CVE-2011-2482. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2012-0007.html.

Comment 4 errata-xmlrpc 2012-01-10 20:10:13 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0007 https://rhn.redhat.com/errata/RHSA-2012-0007.html

Comment 5 Eugene Teo (Security Response) 2012-03-05 02:16:15 UTC
Upstream commit:
http://git.kernel.org/linus/ae53b5bd77719fed58086c5be60ce4f22bffe1c6


Note You need to log in before you can comment on or make changes to this bug.