← Back to team overview

kernel-packages team mailing list archive

[Bug 840002] Re: Test for CVE-2011-1020 fails 50% of the time

 

Closing that outdated report as EOL has been reached long time ago

** Changed in: linux-ec2 (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/840002

Title:
  Test for CVE-2011-1020 fails 50% of the time

Status in linux-ec2 package in Ubuntu:
  Invalid

Bug description:
  While testing linux-image-ec2 2.6.32-318.38 (see tracking bug 837804)
  this test seems to fail around 50% of the time.

  This is a m1.large image, AMD64. Output collected:

  /proc/$pid/ DAC bypass on setuid (CVE-2011-1020) ... FAIL

  ======================================================================
  FAIL: /proc/$pid/ DAC bypass on setuid (CVE-2011-1020)
  ----------------------------------------------------------------------
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 1345, in test_101_proc_fd_leaks
      self.assertShellOutputContains(bad[name], ['sudo','-u',os.environ['SUDO_USER'],"sh","-c","echo '' | ./dac-bypass.py %s" % (name)], invert=expected)
    File "/home/ubuntu/qrt-test-kernel/testlib.py", line 905, in assertShellOutputContains
      self.assertFalse(text in out, msg + result + report)
  AssertionError: Got exit code 10.  Looking for text "[<"
  Command: 'sudo', '-u', 'ubuntu', 'sh', '-c', 'echo '' | ./dac-bypass.py stack'
  Output:
  (current) UNIX password: passwd: Authentication token manipulation error
  passwd: password unchanged
  Changing password for ubuntu.
  [<ffffffffffffffff>] 0xffffffffffffffff

  
  # RUN 2

  ======================================================================
  FAIL: /proc/$pid/ DAC bypass on setuid (CVE-2011-1020)
  ----------------------------------------------------------------------
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 1345, in test_101_proc_fd_leaks
      self.assertShellOutputContains(bad[name], ['sudo','-u',os.environ['SUDO_USER'],"sh","-c","echo '' | ./dac-bypass.py %s" % (name)], invert=expected)
    File "/home/ubuntu/qrt-test-kernel/testlib.py", line 905, in assertShellOutputContains
      self.assertFalse(text in out, msg + result + report)
  AssertionError: Got exit code 10.  Looking for text "[<"
  Command: 'sudo', '-u', 'ubuntu', 'sh', '-c', 'echo '' | ./dac-bypass.py stack'
  Output:
  (current) UNIX password: passwd: Authentication token manipulation error
  passwd: password unchanged
  Changing password for ubuntu.
  [<ffffffff8110054c>] do_select+0x58c/0x6d0
  [<ffffffff81100e65>] core_sys_select+0x185/0x2b0
  [<ffffffff811011e2>] sys_select+0x42/0x110
  [<ffffffff81009bb8>] system_call_fastpath+0x16/0x1b
  [<ffffffffffffffff>] 0xffffffffffffffff

  [<ffffffff810ffc34>] poll_schedule_timeout+0x34/0x50
  [<ffffffff8110054c>] do_select+0x58c/0x6d0
  [<ffffffff81100e65>] core_sys_select+0x185/0x2b0
  [<ffffffff811011e2>] sys_select+0x42/0x110
  [<ffffffff81009bb8>] system_call_fastpath+0x16/0x1b
  [<ffffffffffffffff>] 0xffffffffffffffff

  [<ffffffffffffffff>] 0xffffffffffffffff


  ----------------------------------------------------------------------

  # RUN 4

  ======================================================================
  FAIL: /proc/$pid/ DAC bypass on setuid (CVE-2011-1020)
  ----------------------------------------------------------------------
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 1345, in test_101_proc_fd_leaks
      self.assertShellOutputContains(bad[name], ['sudo','-u',os.environ['SUDO_USER'],"sh","-c","echo '' | ./dac-bypass.py %s" % (name)], invert=expected)
    File "/home/ubuntu/qrt-test-kernel/testlib.py", line 905, in assertShellOutputContains
      self.assertFalse(text in out, msg + result + report)
  AssertionError: Got exit code 10.  Looking for text "[<"
  Command: 'sudo', '-u', 'ubuntu', 'sh', '-c', 'echo '' | ./dac-bypass.py stack'
  Output:
  (current) UNIX password: passwd: Authentication token manipulation error
  passwd: password unchanged
  Changing password for ubuntu.
  [<ffffffff810ffc34>] poll_schedule_timeout+0x34/0x50
  [<ffffffff8110054c>] do_select+0x58c/0x6d0
  [<ffffffff81100ec7>] core_sys_select+0x1e7/0x2b0
  [<ffffffff811011f4>] sys_select+0x54/0x110
  [<ffffffff81009bb8>] system_call_fastpath+0x16/0x1b
  [<ffffffffffffffff>] 0xffffffffffffffff

  # RUN 8

  
  ----------------------------------------------------------------------

  ======================================================================
  FAIL: /proc/$pid/ DAC bypass on setuid (CVE-2011-1020)
  ----------------------------------------------------------------------
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 1345, in test_101_proc_fd_leaks
      self.assertShellOutputContains(bad[name], ['sudo','-u',os.environ['SUDO_USER'],"sh","-c","echo '' | ./dac-bypass.py %s" % (name)], invert=expected)
    File "/home/ubuntu/qrt-test-kernel/testlib.py", line 905, in assertShellOutputContains
      self.assertFalse(text in out, msg + result + report)
  AssertionError: Got exit code 10.  Looking for text "[<"
  Command: 'sudo', '-u', 'ubuntu', 'sh', '-c', 'echo '' | ./dac-bypass.py stack'
  Output:
  (current) UNIX password: passwd: Authentication token manipulation error
  passwd: password unchanged
  Changing password for ubuntu.
  [<ffffffffffffffff>] 0xffffffffffffffff


  ----------------------------------------------------------------------

  # RUN 9

  ======================================================================
  FAIL: /proc/$pid/ DAC bypass on setuid (CVE-2011-1020)
  ----------------------------------------------------------------------
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 1345, in test_101_proc_fd_leaks
      self.assertShellOutputContains(bad[name], ['sudo','-u',os.environ['SUDO_USER'],"sh","-c","echo '' | ./dac-bypass.py %s" % (name)], invert=expected)
    File "/home/ubuntu/qrt-test-kernel/testlib.py", line 905, in assertShellOutputContains
      self.assertFalse(text in out, msg + result + report)
  AssertionError: Got exit code 10.  Looking for text "[<"
  Command: 'sudo', '-u', 'ubuntu', 'sh', '-c', 'echo '' | ./dac-bypass.py stack'
  Output:
  (current) UNIX password: passwd: Authentication token manipulation error
  passwd: password unchanged
  Changing password for ubuntu.
  [<ffffffffffffffff>] 0xffffffffffffffff


  ----------------------------------------------------------------------

  # RUN 10

  ======================================================================
  FAIL: /proc/$pid/ DAC bypass on setuid (CVE-2011-1020)
  ----------------------------------------------------------------------
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 1345, in test_101_proc_fd_leaks
      self.assertShellOutputContains(bad[name], ['sudo','-u',os.environ['SUDO_USER'],"sh","-c","echo '' | ./dac-bypass.py %s" % (name)], invert=expected)
    File "/home/ubuntu/qrt-test-kernel/testlib.py", line 905, in assertShellOutputContains
      self.assertFalse(text in out, msg + result + report)
  AssertionError: Got exit code 10.  Looking for text "[<"
  Command: 'sudo', '-u', 'ubuntu', 'sh', '-c', 'echo '' | ./dac-bypass.py stack'
  Output:
  (current) UNIX password: passwd: Authentication token manipulation error
  passwd: password unchanged
  Changing password for ubuntu.
  [<ffffffff810ffc34>] poll_schedule_timeout+0x34/0x50
  [<ffffffff8110054c>] do_select+0x58c/0x6d0
  [<ffffffff810ea8f6>] mem_cgroup_charge_common+0x76/0xa0
  [<ffffffffffffffff>] 0xffffffffffffffff


  ----------------------------------------------------------------------

  #

  ProblemType: Bug
  DistroRelease: Ubuntu 10.04
  Package: linux-image-2.6.32-318-ec2 2.6.32-318.38
  ProcVersionSignature: User Name 2.6.32-318.38-ec2 2.6.32.44+drm33.19
  Uname: Linux 2.6.32-318-ec2 x86_64
  Architecture: amd64
  Date: Fri Sep  2 23:35:41 2011
  Ec2AMI: ami-a3a764ca
  Ec2AMIManifest: ubuntu-images-testing-us/ubuntu-lucid-daily-amd64-server-20110902.manifest.xml
  Ec2AvailabilityZone: us-east-1d
  Ec2InstanceType: m1.large
  Ec2Kernel: aki-427d952b
  Ec2Ramdisk: unavailable
  ProcEnviron:
   LC_TIME=en_DK.utf8
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: linux-ec2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-ec2/+bug/840002/+subscriptions