[kernel] r5243 - in dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian: . patches patches/series

Simon Horman horms at costa.debian.org
Thu Jan 5 03:11:31 UTC 2006


Author: horms
Date: Thu Jan  5 03:11:30 2006
New Revision: 5243

Added:
   dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/dm-crypt-zero-key.dpatch
Modified:
   dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
   dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-17
Log:
  * dm-crypt-zero-key.dpatch
    [SECURITY] drm-crypt: zero key berofe freeing it.
    Potential local information leak
    CVE-NOMATCH

Modified: dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
==============================================================================
--- dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	(original)
+++ dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog	Thu Jan  5 03:11:30 2006
@@ -342,12 +342,17 @@
     See CVS-2005-4605
     From 2.6.15
 
+  * dm-crypt-zero-key.dpatch
+    [SECURITY] drm-crypt: zero key berofe freeing it. 
+    Potential local information leak
+    CVE-NOMATCH
+
   [ dann frazier ]
   * mempolicy-check-mode.dpatch
     [SECURITY] Input validation in sys_set_mempolicy(); local DoS.
     See CAN-2005-3053
 
- -- Simon Horman <horms at verge.net.au>  Wed,  4 Jan 2006 16:14:43 +0900
+ -- Simon Horman <horms at verge.net.au>  Thu,  5 Jan 2006 11:59:34 +0900
 
 kernel-source-2.6.8 (2.6.8-16) unstable; urgency=low
 

Added: dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/dm-crypt-zero-key.dpatch
==============================================================================
--- (empty file)
+++ dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/dm-crypt-zero-key.dpatch	Thu Jan  5 03:11:30 2006
@@ -0,0 +1,46 @@
+Date: Thu, 5 Jan 2006 01:47:10 +0100
+To: horms at debian.org, dannf at debian.org, micah at riseup.net
+Cc: team at security.debian.org
+Subject: Fwd: [Patch 2.6] dm-crypt: zero key before freeing it
+Message-ID: <20060105004709.GA5494 at informatik.uni-bremen.de>
+From: Moritz Muehlenhoff <jmm at inutil.org>
+
+Horms/Dann,
+I found this on linux-kernel. I guess we should include this in linux-2.6
+and (if applicable, haven't checked yet) to 2.6.8.
+
+Cheers,
+        Moritz
+
+From: Stefan Rompf <stefan at loplof.de>
+Newsgroups: gmane.linux.kernel
+Subject: [Patch 2.6] dm-crypt: zero key before freeing it
+
+Hi Andrew,
+
+dm-crypt does not clear struct crypt_config before freeing it. Thus, 
+information on the key could leak f.e. to a swsusp image even after the 
+encrypted device has been removed. The attached patch against 2.6.14 / 2.6.15 
+fixes it.
+
+Signed-off-by: Stefan Rompf <stefan at loplof.de>
+Acked-by: Clemens Fruhwirth <clemens at endorphin.org>
+
+--- linux-2.6.14.4/drivers/md/dm-crypt.c.old	2005-12-16 18:27:05.000000000 +0100
++++ linux-2.6.14.4/drivers/md/dm-crypt.c	2005-12-28 12:49:13.000000000 +0100
+@@ -694,6 +694,7 @@ bad3:
+ bad2:
+ 	crypto_free_tfm(tfm);
+ bad1:
++	memset(cc, 0, sizeof(*cc) + cc->key_size * sizeof(u8));
+ 	kfree(cc);
+ 	return -EINVAL;
+ }
+@@ -710,6 +711,7 @@ static void crypt_dtr(struct dm_target *
+ 		cc->iv_gen_ops->dtr(cc);
+ 	crypto_free_tfm(cc->tfm);
+ 	dm_put_device(ti, cc->dev);
++	memset(cc, 0, sizeof(*cc) + cc->key_size * sizeof(u8));
+ 	kfree(cc);
+ }
+ 

Modified: dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-17
==============================================================================
--- dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-17	(original)
+++ dists/sarge/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-17	Thu Jan  5 03:11:30 2006
@@ -83,3 +83,4 @@
 + fs-lock-lease-log-spam.dpatch
 + mempolicy-undefined-nodes.dpatch
 + proc-legacy-loff-underflow.dpatch
++ dm-crypt-zero-key.dpatch



More information about the Kernel-svn-changes mailing list