[kernel] r10544 - in dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian: . patches patches/series

Dann Frazier dannf at alioth.debian.org
Thu Feb 14 06:33:31 UTC 2008


Author: dannf
Date: Thu Feb 14 06:33:30 2008
New Revision: 10544

Log:
* 255_pppoe-socket-release-mem-leak.diff
  [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released
  after connect but before PPPIOCGCHAN ioctl is called upon it
  See CVE-2007-2525

Added:
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/255_pppoe-socket-release-mem-leak.diff
Modified:
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge6

Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	Thu Feb 14 06:33:30 2008
@@ -49,6 +49,10 @@
     [SECURITY] Add a sanity check of the block length in cramfs_readpage to
     avoid a potential oops condition
     See CVE-2006-5823
+  * 255_pppoe-socket-release-mem-leak.diff
+    [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released
+    after connect but before PPPIOCGCHAN ioctl is called upon it
+    See CVE-2007-2525
   * 256_i4l-isdn_ioctl-mem-overrun.diff
     [SECURITY] Fix potential isdn ioctl memory overrun
     See CVE-2007-6151
@@ -62,7 +66,7 @@
     ext2_find_entry()
     See CVE-2006-6054
 
- -- dann frazier <dannf at debian.org>  Wed, 13 Feb 2008 23:10:11 -0700
+ -- dann frazier <dannf at debian.org>  Wed, 13 Feb 2008 23:32:09 -0700
 
 kernel-source-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
 

Added: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/255_pppoe-socket-release-mem-leak.diff
==============================================================================
--- (empty file)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/255_pppoe-socket-release-mem-leak.diff	Thu Feb 14 06:33:30 2008
@@ -0,0 +1,42 @@
+commit f1e981303d0f4ccbf3dcd64af41bbf85c62a7122
+Author: dann frazier <dannf at debian.org>
+Date:   Mon Jan 21 23:10:51 2008 -0700
+
+    memory leak when socket is release()d before PPPIOCGCHAN has been called on it
+    
+    This is a 2.4 backport of a linux-2.6 change by Florian Zumbiehl.
+    (commit 202a03acf9994076055df40ae093a5c5474ad0bd)
+    
+    CVE-2007-2525 was assigned for this issue - compile-tested only.
+    
+    Commit log from 2.6 follows.
+    
+      below you find a patch that fixes a memory leak when a PPPoE socket is
+      release()d after it has been connect()ed, but before the PPPIOCGCHAN ioctl
+      ever has been called on it.
+    
+      This is somewhat of a security problem, too, since PPPoE sockets can be
+      created by any user, so any user can easily allocate all the machine's
+      RAM to non-swappable address space and thus DoS the system.
+    
+      Is there any specific reason for PPPoE sockets being available to any
+      unprivileged process, BTW? After all, you need a packet socket for the
+      discovery stage anyway, so it's unlikely that any unprivileged process
+      will ever need to create a PPPoE socket, no? Allocating all session IDs
+      for a known AC is a kind of DoS, too, after all - with Juniper ERXes,
+      this is really easy, actually, since they don't ever assign session ids
+      above 8000 ...
+
+diff --git a/drivers/net/pppox.c b/drivers/net/pppox.c
+index 7830e4d..4883c0f 100644
+--- a/drivers/net/pppox.c
++++ b/drivers/net/pppox.c
+@@ -67,7 +67,7 @@ void pppox_unbind_sock(struct sock *sk)
+ {
+ 	/* Clear connection to ppp device, if attached. */
+ 
+-	if (sk->state & (PPPOX_BOUND|PPPOX_ZOMBIE)) {
++	if (sk->state & (PPPOX_BOUND | PPPOX_CONNECTED | PPPOX_ZOMBIE)) {
+ 		ppp_unregister_channel(&sk->protinfo.pppox->chan);
+ 		sk->state = PPPOX_DEAD;
+ 	}

Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge6
==============================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge6	(original)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge6	Thu Feb 14 06:33:30 2008
@@ -14,6 +14,7 @@
 + 252_openpromfs-checks-3.diff
 + 253_coredump-only-to-same-uid.diff
 + 254_cramfs-check-block-length.diff
++ 255_pppoe-socket-release-mem-leak.diff
 + 256_i4l-isdn_ioctl-mem-overrun.diff
 + 257_isdn-net-overflow.diff
 + 258_ext2_readdir-f_pos-fix.diff



More information about the Kernel-svn-changes mailing list