[Xenial][SRU][CVE-2018-20784][PATCH 0/1] fix infinite loop
Connor Kuehl
connor.kuehl at canonical.com
Fri Sep 27 18:54:49 UTC 2019
https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20784.html
>From the link above:
"In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf
cfs_rq's, which allows attackers to cause a denial of service (infinite
loop in update_blocked_averages) or possibly have unspecified other impact
by inducing a high load."
Note, this fix reverts another patch that was specifically SRU'd in to
Xenial: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1747896
In the hopes of avoiding a trade of 1 regression for another, I did a bit of an
A/B test to see if I could experience any blatant issues.
I booted Xenial in a 64 bit VM twice. The first time was without this
CVE backport applied. The second time was with it applied. I ran the
reproducer in both cases and experienced the same CPU utilization (both
cores I allocated to my VM were at 100%) and in both cases I experienced
stable memory pressure. They would both hover around 120MB +/- 3-5MB.
The primary difference between the two runs was where I'd watch the
cfs_rqs:
WITHOUT the CVE backport: the cfs_rqs fluctuated between 13-18
WITH the CVE backport: the cfs_rqs started around 65, then floated down
to 61.
If there are more tests that anyone would like to see performed before
we settle on a decision for this backport, please let me know. I'm happy
to do it.
- Connor
Linus Torvalds (1):
sched/fair: Fix infinite loop in update_blocked_averages() by
reverting a9e7f6544b9c
kernel/sched/fair.c | 44 ++++++++++----------------------------------
1 file changed, 10 insertions(+), 34 deletions(-)
--
2.17.1
More information about the kernel-team
mailing list