[Bug 956051] Re: libc6 crash while running 'xm'

Adam Conrad adconrad at 0c3.net
Wed Nov 14 22:48:33 UTC 2012


This bug was fixed in the package eglibc - 2.15-0ubuntu10.3

---------------
eglibc (2.15-0ubuntu10.3) precise; urgency=low

  * Backport fixes for dbl-64 and ldbl-128 issues (LP: #1000498)
  * Backport another FMA support patch from glibc master branch.

eglibc (2.15-0ubuntu10.2) precise-security; urgency=low

  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

eglibc (2.15-0ubuntu10.1) precise; urgency=low

  * Backport fix from 2.16 to fix htons() conversion errors on non-x86
    architectures, by correctly casting to uint16_t (LP: #1016349)
  * Restore missing AT_EMPTY_PATH definition in fnctl.h (LP: #1010069)
  * Backport FMA4/AVX detection from glibc 2.16 (LP: #956051, #979003)
  * Backport fixups to AVX-using code to match the detection backport.
  * Backport fix from 2.16 for sscanf/realloc deadlock (LP: #1028038)
  * Backport for bogus FPE on underflow for exp(double) (LP: #1007457)
 -- Adam Conrad <adconrad at ubuntu.com> Wed, 03 Oct 2012 15:58:02 -0600


** Changed in: eglibc (Ubuntu Precise)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3406

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3480

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/956051

Title:
  libc6 crash while running 'xm'

Status in “eglibc” package in Ubuntu:
  Fix Released
Status in “eglibc” source package in Precise:
  Fix Released

Bug description:
  SRU Justification:

  [Impact]
  When using xen as a hypervisor on AMD Bulldozer/Opteron hardware, 'xm list' will cause an 'invalid opcode' trap and crash.

  [Development Fix]
  This is fixed in quantal.

  [Stable Fix]
  A fix can be backported from quantal into precise.

  [Test Case]
  Install xen on an AMD machine with AVX/FMA4 extensions. Run 'xm list'. It is expected to not cause an invalid opcode trap.

  [Regression Potential]
  This patch add checks proper FMA4 and AVX detection in eglibc.

  --

  Ubuntu Version: 12.04 (precise)

  libc6: 2.15-0ubuntu5
  xen-hypervisor-4.1-amd64: 4.1.2-2ubuntu2
  linux-image-generic: 3.2.0.18.20

  Everytime I try to run 'xm list' on a new AMD Opteron 6274 system (Bulldozer architecture) I'm getting a crash.
  I couldn't even file a bug report through "apport-bug".
  Repeating the same procedure with Ubuntu Oneiric showed no problems at all.

  dmesg showed following messages:

  [  479.891581] xm[1746] trap invalid opcode ip:7fd684f8a5fc sp:7fff3ebb3c70 error:0 in libm-2.15.so[7fd684f48000+f9000]
  [  479.937611] apport[1758] trap invalid opcode ip:7fd6cb9ea5fc sp:7fff9bbc06b0 error:0 in libm-2.15.so[7fd6cb9a8000+f9000]
  [  479.937641] Process 1758(apport) has RLIMIT_CORE set to 1
  [  479.937645] Aborting core

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/956051/+subscriptions




More information about the foundations-bugs mailing list