Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <51E4CE5F.5030606@redhat.com>
Date: Mon, 15 Jul 2013 22:38:55 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- Linux kernel: bridge: BUG at kernel/timer.c:729

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/15/2013 03:12 PM, Petr Matousek wrote:
> Several people reported the oops: "kernel BUG at
> kernel/timer.c:729!" and the stack trace is:
> 
> #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8
> [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at 
> ffffffffa0731d25 [bridge] #9 [ffff880214d25c80]
> br_multicast_disable_port+88 at ffffffffa0732948 [bridge] #10
> [ffff880214d25cb0] br_stp_disable_port+154 at ffffffffa072bcca 
> [bridge] #11 [ffff880214d25ce8] br_device_event+520 at
> ffffffffa072a4e8 [bridge] #12 [ffff880214d25d18]
> notifier_call_chain+76 at ffffffff8164aafc #13 [ffff880214d25d50]
> raw_notifier_call_chain+22 at ffffffff810858f6 #14
> [ffff880214d25d60] call_netdevice_notifiers+45 at ffffffff81536aad 
> #15 [ffff880214d25d80] dev_close_many+183 at ffffffff81536d17 #16
> [ffff880214d25dc0] rollback_registered_many+168 at 
> ffffffff81537f68 #17 [ffff880214d25de8] rollback_registered+49 at
> ffffffff81538101 #18 [ffff880214d25e10]
> unregister_netdevice_queue+72 at ffffffff815390d8 #19
> [ffff880214d25e30] __tun_detach+272 at ffffffffa074c2f0 [tun] #20
> [ffff880214d25e88] tun_chr_close+45 at ffffffffa074c4bd [tun] #21
> [ffff880214d25ea8] __fput+225 at ffffffff8119b1f1 #22
> [ffff880214d25ef0] ____fput+14 at ffffffff8119b3fe #23
> [ffff880214d25f00] task_work_run+159 at ffffffff8107cf7f #24
> [ffff880214d25f30] do_notify_resume+97 at ffffffff810139e1 #25
> [ffff880214d25f50] int_signal+18 at ffffffff8164f292
> 
> The bug was usually hit when shutting down a KVM guest.
> 
> Upstream fix: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
>
>  Introduced by: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9f00b2e7cf241fa389733d41b6
>
>  Introduced in upstream version: v3.11-rc1 (but we had it in Fedora
> because of bz#880035)
> 
> References: https://bugzilla.redhat.com/show_bug.cgi?id=984743 
> https://bugzilla.redhat.com/show_bug.cgi?id=980254 
> http://pkgs.fedoraproject.org/cgit/kernel.git/commit/?h=f19&id=a993279a9bb538ae524fca69ec23c5c1b428f47e
>
> 
Please use CVE-2013-4129 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=XDNd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.