r3772 - in
trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian: .
patches patches/series
Simon Horman
horms at costa.debian.org
Tue Aug 9 06:07:08 UTC 2005
Author: horms
Date: 2005-08-09 06:07:07 +0000 (Tue, 09 Aug 2005)
New Revision: 3772
Added:
trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/176_ipsec-array-overflow.diff
Modified:
trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-11
Log:
+ [Security] Fix possible overflow of sock->sk_policy
+ See CAN-2005-2456 (See: #321401)
Modified: trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
===================================================================
--- trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog 2005-08-09 04:25:11 UTC (rev 3771)
+++ trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog 2005-08-09 06:07:07 UTC (rev 3772)
@@ -1,40 +1,39 @@
kernel-source-2.4.27 (2.4.27-11) UNRELEASED; urgency=low
+ [ Simon Horman ]
* 167_arch-ia64-x86_64_execve.diff:
Race condition in the ia32 compatibility code for the execve system call
- See CAN-2005-1768. (closes: #319629). (Simon Horman)
+ See CAN-2005-1768. (closes: #319629).
* 168_fs_ext3_64bit_offset.diff:
Incorrect offset checks for ext3 xattr on 64 bit architectures
can lead to a local DoS.
- See CAN-2005-0757. (closes: #311164). (Simon Horman)
+ See CAN-2005-0757. (closes: #311164).
* 169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch
[Security, x86_64] This works around an AMD Erratum by
checking if the ptrace RIP is canonical.
- See CAN-2005-1762 (Simon Horman)
+ See CAN-2005-1762
* 169_arch-x86_64-kernel-ptrace-canonical-rip-2.dpatch
[Security, x86_64] Fix canonical checking for segment registers in ptrace
- See CAN-2005-0756 (Simon Horman)
+ See CAN-2005-0756
* Makefile-gcc-3.3.dpatch, control
Build with gcc-3.3, as gcc-4.0, now the dedault in unstable,
fails to build this source. Upstream has stated that they
have no intention making the 2.4 kernel compile with gcc-4
- (closes: #320256) (Simon Horman)
+ (closes: #320256)
* 171_arch-ia64-x86_64-execve-overflow.diff
[Security, ia64, x86_64] Fix overflow in 32bit execve
- See CAN-2005-1768 (Simon Horman)
+ See CAN-2005-1768
* 172_ppc32-time_offset-misuse.diff
[ppc32] stop misusing ntps time_offset value
- (Simon Horman)
* 173_tty_ldisc_ref-return-null-check.diff
tty_ldisc_ref return null check
- (Simon Horman)
* 174_net-ipv4-netfilter-nat-mem.diff
Fix potential memory corruption in NAT code (aka memory NAT)
@@ -42,13 +41,15 @@
* 175-net-ipv6-netfilter-deadlock.diff
Fix deadlock in ip6_queue
- (Simon Horman)
+ * 176_ipsec-array-overflow.diff
+ [Security] Fix possible overflow of sock->sk_policy
+ See CAN-2005-2456 (See: #321401)
+
* 177_rocket_c-fix-ldisc-ref-count.diff
Fix ldisc ref count handling in rocketport driver
- (Simon Horman)
- -- Simon Horman <horms at debian.org> Wed, 3 Aug 2005 14:43:45 +0900
+ -- Simon Horman <horms at debian.org> Tue, 9 Aug 2005 15:01:20 +0900
kernel-source-2.4.27 (2.4.27-10) unstable; urgency=low
Added: trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/176_ipsec-array-overflow.diff
===================================================================
--- trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/176_ipsec-array-overflow.diff 2005-08-09 04:25:11 UTC (rev 3771)
+++ trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/176_ipsec-array-overflow.diff 2005-08-09 06:07:07 UTC (rev 3772)
@@ -0,0 +1,32 @@
+From stable-bounces at linux.kernel.org Tue Jul 26 16:40:13 2005
+Date: Tue, 26 Jul 2005 16:40:31 -0700 (PDT)
+To: stable at kernel.org
+From: "David S. Miller" <davem at davemloft.net>
+Subject: [PATCH][XFRM]: Fix possible overflow of sock->sk_policy
+
+From: Herbert Xu <herbert at gondor.apana.org.au>
+
+[XFRM]: Fix possible overflow of sock->sk_policy
+
+Spotted by, and original patch by, Balazs Scheidler.
+
+Signed-off-by: Herbert Xu <herbert at gondor.apana.org.au>
+Signed-off-by: David S. Miller <davem at davemloft.net>
+Signed-off-by: Chris Wright <chrisw at osdl.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh at suse.de>
+---
+ net/xfrm/xfrm_user.c | 3 +++
+ 1 files changed, 3 insertions(+)
+
+--- linux-2.6.12.3.orig/net/xfrm/xfrm_user.c 2005-07-28 11:17:01.000000000 -0700
++++ linux-2.6.12.3/net/xfrm/xfrm_user.c 2005-07-28 11:17:18.000000000 -0700
+@@ -1180,6 +1180,9 @@
+ if (nr > XFRM_MAX_DEPTH)
+ return NULL;
+
++ if (p->dir > XFRM_POLICY_OUT)
++ return NULL;
++
+ xp = xfrm_policy_alloc(GFP_KERNEL);
+ if (xp == NULL) {
+ *dir = -ENOBUFS;
Modified: trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-11
===================================================================
--- trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-11 2005-08-09 04:25:11 UTC (rev 3771)
+++ trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-11 2005-08-09 06:07:07 UTC (rev 3772)
@@ -8,4 +8,5 @@
+ 173_tty_ldisc_ref-return-null-check.diff
+ 174_net-ipv4-netfilter-nat-mem.diff
+ 175-net-ipv6-netfilter-deadlock.diff
++ 176_ipsec-array-overflow.diff
+ 177_rocket_c-fix-ldisc-ref-count.diff
More information about the Kernel-svn-changes
mailing list