[kernel] r6032 - patch-tracking

Dann Frazier dannf at costa.debian.org
Thu Mar 2 18:15:56 UTC 2006


Author: dannf
Date: Thu Mar  2 18:15:54 2006
New Revision: 6032

Added:
   patch-tracking/CVE-2006-0741
      - copied, changed from r6031, patch-tracking/00boilerplate
   patch-tracking/CVE-2006-0741-2.4.patch
Log:
new issue

Copied: patch-tracking/CVE-2006-0741 (from r6031, patch-tracking/00boilerplate)
==============================================================================
--- patch-tracking/00boilerplate	(original)
+++ patch-tracking/CVE-2006-0741	Thu Mar  2 18:15:54 2006
@@ -1,7 +1,11 @@
-Candidate: 
+Candidate: CVE-2006-0741
 References: 
 Description: 
+ Fixes a local DOS on Intel systems that lead to an endless
+recursive fault.  AMD machines don't seem to be affected.
 Notes: 
+ 2.6: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5342fba5412cead88b61ead07168615dbeba1ee3
+ 2.4 patch is CVE-2006-0741-2.4.patch
 Bugs: 
 upstream: 
 linux-2.6:

Added: patch-tracking/CVE-2006-0741-2.4.patch
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2006-0741-2.4.patch	Thu Mar  2 18:15:54 2006
@@ -0,0 +1,30 @@
+Check for bad elf entry address.
+
+From: Suresh Siddha <suresh.b.siddha at intel.com>
+
+Fixes a local DOS on Intel systems that lead to an endless
+recursive fault.  AMD machines don't seem to be affected.
+
+Signed-off-by: Suresh Siddha <suresh.b.siddha at intel.com>
+Signed-off-by: Andi Kleen <ak at suse.de>
+
+---
+ fs/binfmt_elf.c |    5 +++++
+ 1 files changed, 5 insertions(+)
+
+Index: linux/fs/binfmt_elf.c
+===================================================================
+--- linux.orig/fs/binfmt_elf.c
++++ linux/fs/binfmt_elf.c
+@@ -943,6 +943,11 @@ static int load_elf_binary(struct linux_
+ 		kfree(elf_interpreter);
+ 	} else {
+ 		elf_entry = loc->elf_ex.e_entry;
++		if (BAD_ADDR(elf_entry)) {
++			send_sig(SIGSEGV, current, 0);
++			retval = -ENOEXEC; /* Nobody gets to see this, but.. */
++			goto out_free_dentry;
++		}
+ 	}
+ 
+ 	kfree(elf_phdata);



More information about the Kernel-svn-changes mailing list