[Glibc-bsd-commits] r5941 - in branches/jessie/kfreebsd-10/debian: . patches

stevenc-guest at alioth.debian.org stevenc-guest at alioth.debian.org
Wed Mar 16 23:24:22 UTC 2016


Author: stevenc-guest
Date: 2016-03-16 23:24:21 +0000 (Wed, 16 Mar 2016)
New Revision: 5941

Added:
   branches/jessie/kfreebsd-10/debian/patches/SA-16_10.linux.patch
Modified:
   branches/jessie/kfreebsd-10/debian/changelog
   branches/jessie/kfreebsd-10/debian/patches/series
Log:
Pick SVN r294904 from FreeBSD 10.1-RELEASE:
- SA-16:10: Fix Linux compatibility layer issetugid(2) system call
  vulnerability. (CVE-2016-1883) (Closes: #818423)


Modified: branches/jessie/kfreebsd-10/debian/changelog
===================================================================
--- branches/jessie/kfreebsd-10/debian/changelog	2016-03-13 13:25:05 UTC (rev 5940)
+++ branches/jessie/kfreebsd-10/debian/changelog	2016-03-16 23:24:21 UTC (rev 5941)
@@ -1,5 +1,13 @@
-kfreebsd-10 (10.1~svn274115-4+kbsd8u2) UNRELEASED; urgency=high
+kfreebsd-10 (10.1~svn274115-4+kbsd8u3) UNRELEASED; urgency=high
 
+  * Pick SVN r294904 from FreeBSD 10.1-RELEASE:
+    - SA-16:10: Fix Linux compatibility layer issetugid(2) system call
+      vulnerability. (CVE-2016-1883) (Closes: #818423)
+
+ -- Steven Chamberlain <steven at pyro.eu.org>  Wed, 16 Mar 2016 23:16:33 +0000
+
+kfreebsd-10 (10.1~svn274115-4+kbsd8u2) jessie-kfreebsd; urgency=high
+
   * Pick SVN r293894 from FreeBSD 10.1-RELEASE:
     - EN-16:02: Fix invalid TCP checksums with pf(4). (Closes: #811282)
     - SA-16:01: Fix SCTP ICMPv6 error message vulnerability.

Added: branches/jessie/kfreebsd-10/debian/patches/SA-16_10.linux.patch
===================================================================
--- branches/jessie/kfreebsd-10/debian/patches/SA-16_10.linux.patch	                        (rev 0)
+++ branches/jessie/kfreebsd-10/debian/patches/SA-16_10.linux.patch	2016-03-16 23:24:21 UTC (rev 5941)
@@ -0,0 +1,60 @@
+Description:
+ Fix Linux compatibility layer issetugid(2) system call
+ vulnerability. [SA-16:10]
+Origin: vendor
+Bug: https://www.freebsd.org/security/advisories/FreeBSD-SA-16:10.linux.asc
+Applied-Upstream: https://svnweb.freebsd.org/base?view=revision&revision=294904
+
+--- a/sys/amd64/linux32/linux32_sysvec.c
++++ b/sys/amd64/linux32/linux32_sysvec.c
+@@ -248,6 +248,7 @@
+ 	Elf32_Addr *base;
+ 	Elf32_Addr *pos, *uplatform;
+ 	struct linux32_ps_strings *arginfo;
++	int issetugid;
+ 
+ 	arginfo = (struct linux32_ps_strings *)LINUX32_PS_STRINGS;
+ 	uplatform = (Elf32_Addr *)((caddr_t)arginfo - linux_szplatform);
+@@ -258,6 +259,7 @@
+ 	args = (Elf32_Auxargs *)imgp->auxargs;
+ 	pos = base + (imgp->args->argc + imgp->args->envc + 2);
+ 
++	issetugid = imgp->proc->p_flag & P_SUGID ? 1 : 0;
+ 	AUXARGS_ENTRY_32(pos, LINUX_AT_HWCAP, cpu_feature);
+ 
+ 	/*
+@@ -277,7 +279,7 @@
+ 	AUXARGS_ENTRY_32(pos, AT_FLAGS, args->flags);
+ 	AUXARGS_ENTRY_32(pos, AT_ENTRY, args->entry);
+ 	AUXARGS_ENTRY_32(pos, AT_BASE, args->base);
+-	AUXARGS_ENTRY_32(pos, LINUX_AT_SECURE, 0);
++	AUXARGS_ENTRY_32(pos, LINUX_AT_SECURE, issetugid);
+ 	AUXARGS_ENTRY_32(pos, AT_UID, imgp->proc->p_ucred->cr_ruid);
+ 	AUXARGS_ENTRY_32(pos, AT_EUID, imgp->proc->p_ucred->cr_svuid);
+ 	AUXARGS_ENTRY_32(pos, AT_GID, imgp->proc->p_ucred->cr_rgid);
+--- a/sys/i386/linux/linux_sysvec.c
++++ b/sys/i386/linux/linux_sysvec.c
+@@ -244,11 +244,13 @@
+ 	Elf32_Addr *uplatform;
+ 	struct ps_strings *arginfo;
+ 	register_t *pos;
++	int issetugid;
+ 
+ 	KASSERT(curthread->td_proc == imgp->proc,
+ 	    ("unsafe elf_linux_fixup(), should be curproc"));
+ 
+ 	p = imgp->proc;
++	issetugid = imgp->proc->p_flag & P_SUGID ? 1 : 0;
+ 	arginfo = (struct ps_strings *)p->p_sysent->sv_psstrings;
+ 	uplatform = (Elf32_Addr *)((caddr_t)arginfo - linux_szplatform);
+ 	args = (Elf32_Auxargs *)imgp->auxargs;
+@@ -273,7 +275,7 @@
+ 	AUXARGS_ENTRY(pos, AT_FLAGS, args->flags);
+ 	AUXARGS_ENTRY(pos, AT_ENTRY, args->entry);
+ 	AUXARGS_ENTRY(pos, AT_BASE, args->base);
+-	AUXARGS_ENTRY(pos, LINUX_AT_SECURE, 0);
++	AUXARGS_ENTRY(pos, LINUX_AT_SECURE, issetugid);
+ 	AUXARGS_ENTRY(pos, AT_UID, imgp->proc->p_ucred->cr_ruid);
+ 	AUXARGS_ENTRY(pos, AT_EUID, imgp->proc->p_ucred->cr_svuid);
+ 	AUXARGS_ENTRY(pos, AT_GID, imgp->proc->p_ucred->cr_rgid);
+

Modified: branches/jessie/kfreebsd-10/debian/patches/series
===================================================================
--- branches/jessie/kfreebsd-10/debian/patches/series	2016-03-13 13:25:05 UTC (rev 5940)
+++ branches/jessie/kfreebsd-10/debian/patches/series	2016-03-16 23:24:21 UTC (rev 5941)
@@ -53,3 +53,4 @@
 SA-16_03.linux.patch
 SA-16_04.linux.patch
 SA-16_05.tcp.patch
+SA-16_10.linux.patch




More information about the Glibc-bsd-commits mailing list