r4697 - dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series people/horms/patch_notes/2.6-stable people/horms/patch_notes/cve

Simon Horman horms at costa.debian.org
Mon Oct 31 09:47:16 UTC 2005


Author: horms
Date: 2005-10-31 09:47:15 +0000 (Mon, 31 Oct 2005)
New Revision: 4697

Removed:
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff
   dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff
Modified:
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge2
   dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
   dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-12
   people/horms/patch_notes/2.6-stable/2.6.13.4
   people/horms/patch_notes/cve/CAN-2005-3181
   people/horms/patch_notes/cve/setkeys-needs-root.patch
Log:
CAN-2005-3181 is not in 2.4 as AUDITSYSCALL doesn't exist

Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
===================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	2005-10-31 08:02:25 UTC (rev 4696)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	2005-10-31 09:47:15 UTC (rev 4697)
@@ -31,10 +31,6 @@
     See CAN-2005-3180
     From 2.6.13.4
 
-  * 193_plug-names_cache-memleak.diff
-    [SECURITY] Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
-    From 2.6.13.4
-
   * 194_xfs-inode-race.diff
      [SECURITY] XFS: Handle inode creation race
      CAN-NOMATCH
@@ -44,7 +40,7 @@
   * 195_net-ipv6-udp_v6_get_port-loop.diff
     [SECURITY] Fix infinite loop in udp_v6_get_port().  See CVE-2005-2973
 
- -- dann frazier <dannf at debian.org>  Mon, 24 Oct 2005 13:36:59 -0600
+ -- Simon Horman <horms at debian.org>  Mon, 31 Oct 2005 18:44:52 +0900
 
 kernel-source-2.4.27 (2.4.27-10sarge1) stable-security; urgency=high
 

Deleted: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff
===================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff	2005-10-31 08:02:25 UTC (rev 4696)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff	2005-10-31 09:47:15 UTC (rev 4697)
@@ -1,51 +0,0 @@
-From: Linus Torvalds <torvalds at osdl.org>
-Date: Fri, 7 Oct 2005 04:54:21 +0000 (-0700)
-Subject: [PATCH] Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
-
-Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
-
-The nameidata "last.name" is always allocated with "__getname()", and
-should always be free'd with "__putname()".
-
-Using "putname()" without the underscores will leak memory, because the
-allocation will have been hidden from the AUDITSYSCALL code.
-
-Arguably the real bug is that the AUDITSYSCALL code is really broken,
-but in the meantime this fixes the problem people see.
-
-Reported by Robert Derr, patch by Rick Lindsley.
-
-Acked-by: Al Viro <viro at ftp.linux.org.uk>
-Signed-off-by: Linus Torvalds <torvalds at osdl.org>
-Signed-off-by: Chris Wright <chrisw at osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh at suse.de>
----
- fs/namei.c |    6 +++---
- 1 file changed, 3 insertions(+), 3 deletions(-)
-
-Backported to Debian's 2.4.27 by Horms
-
---- from-0001/fs/namei.c
-+++ to-work/fs/namei.c	2005-10-11 18:23:56.000000000 +0900
-@@ -1198,18 +1198,18 @@ do_link:
- 	if (nd->last_type != LAST_NORM)
- 		goto exit;
- 	if (nd->last.name[nd->last.len]) {
--		putname(nd->last.name);
-+		__putname(nd->last.name);
- 		goto exit;
- 	}
- 	error = -ELOOP;
- 	if (count++==32) {
--		putname(nd->last.name);
-+		__putname(nd->last.name);
- 		goto exit;
- 	}
- 	dir = nd->dentry;
- 	down(&dir->d_inode->i_sem);
- 	dentry = lookup_hash(&nd->last, nd->dentry);
--	putname(nd->last.name);
-+	__putname(nd->last.name);
- 	goto do_last;
- }
- 

Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge2
===================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge2	2005-10-31 08:02:25 UTC (rev 4696)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge2	2005-10-31 09:47:15 UTC (rev 4697)
@@ -2,6 +2,5 @@
 + 186_zlib-revert-broken-change.diff
 + 187_zisofs-2.diff
 + 192_orinoco-info-leak.diff
-+ 193_plug-names_cache-memleak.diff
 + 194_xfs-inode-race.diff
 + 195_net-ipv6-udp_v6_get_port-loop.diff

Modified: dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
===================================================================
--- dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	2005-10-31 08:02:25 UTC (rev 4696)
+++ dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	2005-10-31 09:47:15 UTC (rev 4697)
@@ -75,19 +75,15 @@
     See CAN-2005-3180
     From 2.6.13.4
 
-  * 193_plug-names_cache-memleak.diff
-    [SECURITY] Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
-    From 2.6.13.4
-
   * 194_xfs-inode-race.diff
     [SECURITY] XFS: Handle inode creation race
     CAN-NOMATCH
     Links in Patch file
 
-  * 195_net-ipv6-udp_v6_get_port-loop.diff 
+  * 195_net-ipv6-udp_v6_get_port-loop.diff
      [SECURITY] Fix infinite loop in udp_v6_get_port().  See CVE-2005-2973
 
- -- Simon Horman <horms at debian.org>  Thu, 27 Oct 2005 15:26:00 +0900
+ -- Simon Horman <horms at debian.org>  Mon, 31 Oct 2005 18:43:51 +0900
 
 kernel-source-2.4.27 (2.4.27-11) unstable; urgency=low
 

Deleted: dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff
===================================================================
--- dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff	2005-10-31 08:02:25 UTC (rev 4696)
+++ dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/193_plug-names_cache-memleak.diff	2005-10-31 09:47:15 UTC (rev 4697)
@@ -1,51 +0,0 @@
-From: Linus Torvalds <torvalds at osdl.org>
-Date: Fri, 7 Oct 2005 04:54:21 +0000 (-0700)
-Subject: [PATCH] Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
-
-Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
-
-The nameidata "last.name" is always allocated with "__getname()", and
-should always be free'd with "__putname()".
-
-Using "putname()" without the underscores will leak memory, because the
-allocation will have been hidden from the AUDITSYSCALL code.
-
-Arguably the real bug is that the AUDITSYSCALL code is really broken,
-but in the meantime this fixes the problem people see.
-
-Reported by Robert Derr, patch by Rick Lindsley.
-
-Acked-by: Al Viro <viro at ftp.linux.org.uk>
-Signed-off-by: Linus Torvalds <torvalds at osdl.org>
-Signed-off-by: Chris Wright <chrisw at osdl.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh at suse.de>
----
- fs/namei.c |    6 +++---
- 1 file changed, 3 insertions(+), 3 deletions(-)
-
-Backported to Debian's 2.4.27 by Horms
-
---- from-0001/fs/namei.c
-+++ to-work/fs/namei.c	2005-10-11 18:23:56.000000000 +0900
-@@ -1198,18 +1198,18 @@ do_link:
- 	if (nd->last_type != LAST_NORM)
- 		goto exit;
- 	if (nd->last.name[nd->last.len]) {
--		putname(nd->last.name);
-+		__putname(nd->last.name);
- 		goto exit;
- 	}
- 	error = -ELOOP;
- 	if (count++==32) {
--		putname(nd->last.name);
-+		__putname(nd->last.name);
- 		goto exit;
- 	}
- 	dir = nd->dentry;
- 	down(&dir->d_inode->i_sem);
- 	dentry = lookup_hash(&nd->last, nd->dentry);
--	putname(nd->last.name);
-+	__putname(nd->last.name);
- 	goto do_last;
- }
- 

Modified: dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-12
===================================================================
--- dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-12	2005-10-31 08:02:25 UTC (rev 4696)
+++ dists/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-12	2005-10-31 09:47:15 UTC (rev 4697)
@@ -9,6 +9,5 @@
 + 190_outs-2.diff
 + 191_build_foo.diff
 + 192_orinoco-info-leak.diff
-+ 193_plug-names_cache-memleak.diff
 + 194_xfs-inode-race.diff
 + 195_net-ipv6-udp_v6_get_port-loop.diff

Modified: people/horms/patch_notes/2.6-stable/2.6.13.4
===================================================================
--- people/horms/patch_notes/2.6-stable/2.6.13.4	2005-10-31 08:02:25 UTC (rev 4696)
+++ people/horms/patch_notes/2.6-stable/2.6.13.4	2005-10-31 09:47:15 UTC (rev 4697)
@@ -70,8 +70,8 @@
    2.6.12: added to svn; backport; plug-names_cache-memleak.dpatch
    2.6.8-sarge: added to svn; backport; plug-names_cache-memleak.dpatch
    2.6.8-sarge-security: added to svn; backport; plug-names_cache-memleak.dpatch
-   2.4.27-sid/sarge: added to svn; backport; 193_plug-names_cache-memleak.diff
-   2.4.27-sarge-security: added to svn; backport; 193_plug-names_cache-memleak.diff
+   2.4.27-sid/sarge: not vulnerable; AUDITSYSCALL doesn't exist in 2.4
+   2.4.27-sarge-security: not vulnerable; AUDITSYSCALL doesn't exist in 2.4
 
  * [SECURITY] key: plug request_key_auth memleak
    See CAN-2005-3119

Modified: people/horms/patch_notes/cve/CAN-2005-3181
===================================================================
--- people/horms/patch_notes/cve/CAN-2005-3181	2005-10-31 08:02:25 UTC (rev 4696)
+++ people/horms/patch_notes/cve/CAN-2005-3181	2005-10-31 09:47:15 UTC (rev 4697)
@@ -10,10 +10,10 @@
  allows attackers to cause a denial of service (memory consumption).
 
 Bug:
-fixed-upstream: pending (2.6.13); submitted for inclsuion in 2.4.32-rc2
+fixed-upstream: 2.6.13.4
 2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.6.8-sarge: pending (2.6.8-17)
-2.4.27-sarge-security: pending (2.4.27-10sarge2)
-2.4.27-sarge/sid: pending (2.4.27-12)
+2.4.27-sarge-security: not vulnerable: AUDITSYSCALL doesn't exist in 2.4
+2.4.27-sarge/sid: not vulnerable: AUDITSYSCALL doesn't exist in 2.4
 

Modified: people/horms/patch_notes/cve/setkeys-needs-root.patch
===================================================================
--- people/horms/patch_notes/cve/setkeys-needs-root.patch	2005-10-31 08:02:25 UTC (rev 4696)
+++ people/horms/patch_notes/cve/setkeys-needs-root.patch	2005-10-31 09:47:15 UTC (rev 4697)
@@ -10,10 +10,10 @@
  allows attackers to cause a denial of service (memory consumption).
 
 Bug:
-fixed-upstream: pending (2.6.13); submitted for inclsuion in 2.4.32-rc2
+fixed-upstream: 2.6.13.4
 2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
 2.6.8-sarge-security: pending (2.6.8-16sarge2)
 2.6.8-sarge: pending (2.6.8-17)
-2.4.27-sarge-security: pending (2.4.27-10sarge2)
-2.4.27-sarge/sid: pending (2.4.27-12)
+2.4.27-sarge-security: not vulnerable: AUDITSYSCALL doesn't exist in 2.4
+2.4.27-sarge/sid: not vulnerable: AUDITSYSCALL doesn't exist in 2.4
 




More information about the Kernel-svn-changes mailing list