[Bug 956051] Re: libc6 crash while running 'xm'
Adam Conrad
adconrad at 0c3.net
Wed Nov 14 22:48:33 UTC 2012
This bug was fixed in the package eglibc - 2.15-0ubuntu10.3
---------------
eglibc (2.15-0ubuntu10.3) precise; urgency=low
* Backport fixes for dbl-64 and ldbl-128 issues (LP: #1000498)
* Backport another FMA support patch from glibc master branch.
eglibc (2.15-0ubuntu10.2) precise-security; urgency=low
* SECURITY UPDATE: stack buffer overflow in vfprintf handling
(LP: #1031301)
- debian/patches/any/CVE-2012-3406.patch: switch to malloc when
array grows too large to handle via alloca extension
- CVE-2012-3406
* SECURITY UPDATE: stdlib strtod integer/buffer overflows
- debian/patches/any/CVE-2012-3480.patch: rearrange calculations
and modify types to void integer overflows
- CVE-2012-3480
eglibc (2.15-0ubuntu10.1) precise; urgency=low
* Backport fix from 2.16 to fix htons() conversion errors on non-x86
architectures, by correctly casting to uint16_t (LP: #1016349)
* Restore missing AT_EMPTY_PATH definition in fnctl.h (LP: #1010069)
* Backport FMA4/AVX detection from glibc 2.16 (LP: #956051, #979003)
* Backport fixups to AVX-using code to match the detection backport.
* Backport fix from 2.16 for sscanf/realloc deadlock (LP: #1028038)
* Backport for bogus FPE on underflow for exp(double) (LP: #1007457)
-- Adam Conrad <adconrad at ubuntu.com> Wed, 03 Oct 2012 15:58:02 -0600
** Changed in: eglibc (Ubuntu Precise)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3406
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3480
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/956051
Title:
libc6 crash while running 'xm'
Status in “eglibc” package in Ubuntu:
Fix Released
Status in “eglibc” source package in Precise:
Fix Released
Bug description:
SRU Justification:
[Impact]
When using xen as a hypervisor on AMD Bulldozer/Opteron hardware, 'xm list' will cause an 'invalid opcode' trap and crash.
[Development Fix]
This is fixed in quantal.
[Stable Fix]
A fix can be backported from quantal into precise.
[Test Case]
Install xen on an AMD machine with AVX/FMA4 extensions. Run 'xm list'. It is expected to not cause an invalid opcode trap.
[Regression Potential]
This patch add checks proper FMA4 and AVX detection in eglibc.
--
Ubuntu Version: 12.04 (precise)
libc6: 2.15-0ubuntu5
xen-hypervisor-4.1-amd64: 4.1.2-2ubuntu2
linux-image-generic: 3.2.0.18.20
Everytime I try to run 'xm list' on a new AMD Opteron 6274 system (Bulldozer architecture) I'm getting a crash.
I couldn't even file a bug report through "apport-bug".
Repeating the same procedure with Ubuntu Oneiric showed no problems at all.
dmesg showed following messages:
[ 479.891581] xm[1746] trap invalid opcode ip:7fd684f8a5fc sp:7fff3ebb3c70 error:0 in libm-2.15.so[7fd684f48000+f9000]
[ 479.937611] apport[1758] trap invalid opcode ip:7fd6cb9ea5fc sp:7fff9bbc06b0 error:0 in libm-2.15.so[7fd6cb9a8000+f9000]
[ 479.937641] Process 1758(apport) has RLIMIT_CORE set to 1
[ 479.937645] Aborting core
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/956051/+subscriptions
More information about the foundations-bugs
mailing list