Attaching patch that is being sent to Kernel Team by e-mail.

** Description changed:

+ SRU Justification:
+ 
+ Impact: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
+ Fix: Upstream, a3c54931199565930d6d84f4c3456f6440aefd41
+ Testcase: Comment #7
+ 
+ Old Description:
+ 
  I'm running trusty on a bunch of machines, doing frequent dist-upgrades.
  My hosts have gcc-multilib installed.
  
  Yesterday, I noticed that initramfs generation was hanging.  Today I
  investigated further and found out that what was hanging were the calls
  to /libx32/ld-linux-x32.so.2.
  
  This is triggered in initramfs generation because there are at some
  hooks that incorrectly use copy_exec to copy shell scripts into the
  initramfs image.  In a working machine, when ldd encounters a shell
  script, it will first call the 64bit linker and since it fails, it will
  then call the 32bit linker which will also fail.
  
  However, in a machine affected by this bug, the second call will hang
  forever, preventing new image generation, and package updates in
  general, when this happens as a trigger for update-initramfs.
  
  Originally I thought this was related to the kernel version, since I was
  unable to reproduce in a freshly installed machine running -22 and was
  reproducing it in a machine running -20, but now I'm also reproducing it
  in a machine running -22, so it must be something else.
  
  I'm sorry I can't provide the exact cause right now, but I think it's
  worth noting that in some situation there might be a problem, and try to
  find out which those situations are.
  
  I now have one host running 3.13.0-22-generic, with
  libc6-x32=2.19-0ubuntu3, where doing ldd /usr/bin/ldd hangs, and another
  host, with the exact same kernel and libc6-x32 version where doing ldd
  /usr/bin/ldd produces the expected error message (not a dynamic
  executable).  The main difference is that the first one was installed
  yesterday and the second one was installed today.  Both are dist-
  upgraded to the latest version of everything.

** Patch added: 
"0001-Trusty-CVE-2014-3917-upstream-auditsc-audit_krule-ma.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+attachment/4162138/+files/0001-Trusty-CVE-2014-3917-upstream-auditsc-audit_krule-ma.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1302605

Title:
  Calls to /libx32/ld-linux-x32.so.2 hang when using auditd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to