[kernel] r10123 - in dists/etch-security/linux-2.6/debian: . patches/bugfix patches/series

Dann Frazier dannf at alioth.debian.org
Wed Jan 16 07:37:12 UTC 2008


Author: dannf
Date: Wed Jan 16 07:37:12 2008
New Revision: 10123

Log:
* bugfix/do_brk-security-hook.patch
  Add security checks to do_brk() to prevent unprivileged users from
  accessing low memory pages
  See CVE-2007-6434

Added:
   dists/etch-security/linux-2.6/debian/patches/bugfix/do_brk-security-hook.patch
Modified:
   dists/etch-security/linux-2.6/debian/changelog
   dists/etch-security/linux-2.6/debian/patches/series/17etch1

Modified: dists/etch-security/linux-2.6/debian/changelog
==============================================================================
--- dists/etch-security/linux-2.6/debian/changelog	(original)
+++ dists/etch-security/linux-2.6/debian/changelog	Wed Jan 16 07:37:12 2008
@@ -16,8 +16,12 @@
     local user to read potentially sensitive kernel memory from the proc
     filesystem
     See CVE-2007-4571
+  * bugfix/do_brk-security-hook.patch
+    Add security checks to do_brk() to prevent unprivileged users from
+    accessing low memory pages
+    See CVE-2007-6434
 
- -- dann frazier <dannf at debian.org>  Tue, 15 Jan 2008 16:44:15 -0700
+ -- dann frazier <dannf at debian.org>  Wed, 16 Jan 2008 00:31:52 -0700
 
 linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high
 

Added: dists/etch-security/linux-2.6/debian/patches/bugfix/do_brk-security-hook.patch
==============================================================================
--- (empty file)
+++ dists/etch-security/linux-2.6/debian/patches/bugfix/do_brk-security-hook.patch	Wed Jan 16 07:37:12 2008
@@ -0,0 +1,34 @@
+commit ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5
+Author: Eric Paris <eparis at redhat.com>
+Date:   Tue Dec 4 23:45:31 2007 -0800
+
+    VM/Security: add security hook to do_brk
+    
+    Given a specifically crafted binary do_brk() can be used to get low pages
+    available in userspace virtual memory and can thus be used to circumvent
+    the mmap_min_addr low memory protection.  Add security checks in do_brk().
+    
+    Signed-off-by: Eric Paris <eparis at redhat.com>
+    Acked-by: Alan Cox <alan at redhat.com>
+    Cc: Stephen Smalley <sds at tycho.nsa.gov>
+    Cc: James Morris <jmorris at namei.org>
+    Cc: Chris Wright <chrisw at sous-sol.org>
+    Signed-off-by: Andrew Morton <akpm at linux-foundation.org>
+    Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
+
+Adjusted to apply to Debian's 2.6.18 by dann frazier <dannf at debian.org>
+
+diff -urpN linux-source-2.6.18.orig/mm/mmap.c linux-source-2.6.18/mm/mmap.c
+--- linux-source-2.6.18.orig/mm/mmap.c	2008-01-15 16:46:27.000000000 -0700
++++ linux-source-2.6.18/mm/mmap.c	2008-01-16 00:28:42.000000000 -0700
+@@ -1883,6 +1883,10 @@ unsigned long do_brk(unsigned long addr,
+ 	if ((addr + len) > TASK_SIZE || (addr + len) < addr)
+ 		return -EINVAL;
+ 
++	error = security_file_mmap(0, 0, 0, 0, addr, 1);
++	if (error)
++		return error;
++
+ 	flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags;
+ 
+ 	error = arch_mmap_check(addr, len, flags);

Modified: dists/etch-security/linux-2.6/debian/patches/series/17etch1
==============================================================================
--- dists/etch-security/linux-2.6/debian/patches/series/17etch1	(original)
+++ dists/etch-security/linux-2.6/debian/patches/series/17etch1	Wed Jan 16 07:37:12 2008
@@ -3,3 +3,4 @@
 + bugfix/fat-move-ioctl-compat-code.patch
 + bugfix/fat-fix-compat-ioctls.patch
 + bugfix/proc-snd-page-alloc-mem-leak.patch
++ bugfix/do_brk-security-hook.patch



More information about the Kernel-svn-changes mailing list