[kernel] r12188 - in dists/etch-security/linux-2.6.24/debian: . patches/bugfix patches/series

Dann Frazier dannf at alioth.debian.org
Fri Sep 5 18:06:59 UTC 2008


Author: dannf
Date: Fri Sep  5 18:06:58 2008
New Revision: 12188

Log:
Fix buffer overrun decoding NFSv4 acl (CVE-2008-3915)

Added:
   dists/etch-security/linux-2.6.24/debian/patches/bugfix/nfsd-fix-buffer-overrun-decoding-nfsv4-acl.patch
Modified:
   dists/etch-security/linux-2.6.24/debian/changelog
   dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.5

Modified: dists/etch-security/linux-2.6.24/debian/changelog
==============================================================================
--- dists/etch-security/linux-2.6.24/debian/changelog	(original)
+++ dists/etch-security/linux-2.6.24/debian/changelog	Fri Sep  5 18:06:58 2008
@@ -10,8 +10,9 @@
   * Fix overflow condition in sctp_setsockopt_auth_key (CVE-2008-3526)
   * Fix kernel BUG in tmpfs (CVE-2008-3534)
   * Fix off-by-one error in iov_iter_advance() (CVE-2008-3535)
+  * Fix buffer overrun decoding NFSv4 acl (CVE-2008-3915)
 
- -- dann frazier <dannf at debian.org>  Fri, 05 Sep 2008 11:11:02 -0600
+ -- dann frazier <dannf at debian.org>  Fri, 05 Sep 2008 11:38:20 -0600
 
 linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low
 

Added: dists/etch-security/linux-2.6.24/debian/patches/bugfix/nfsd-fix-buffer-overrun-decoding-nfsv4-acl.patch
==============================================================================
--- (empty file)
+++ dists/etch-security/linux-2.6.24/debian/patches/bugfix/nfsd-fix-buffer-overrun-decoding-nfsv4-acl.patch	Fri Sep  5 18:06:58 2008
@@ -0,0 +1,27 @@
+commit 91b80969ba466ba4b915a4a1d03add8c297add3f
+Author: J. Bruce Fields <bfields at citi.umich.edu>
+Date:   Fri Aug 29 19:18:45 2008 -0400
+
+    nfsd: fix buffer overrun decoding NFSv4 acl
+    
+    The array we kmalloc() here is not large enough.
+    
+    Thanks to Johann Dahm and David Richter for bug report and testing.
+    
+    Signed-off-by: J. Bruce Fields <bfields at citi.umich.edu>
+    Cc: David Richter <richterd at citi.umich.edu>
+    Tested-by: Johann Dahm <jdahm at umich.edu>
+
+diff --git a/fs/nfsd/nfs4acl.c b/fs/nfsd/nfs4acl.c
+index b6ed383..54b8b41 100644
+--- a/fs/nfsd/nfs4acl.c
++++ b/fs/nfsd/nfs4acl.c
+@@ -443,7 +443,7 @@ init_state(struct posix_acl_state *state, int cnt)
+ 	 * enough space for either:
+ 	 */
+ 	alloc = sizeof(struct posix_ace_state_array)
+-		+ cnt*sizeof(struct posix_ace_state);
++		+ cnt*sizeof(struct posix_user_ace_state);
+ 	state->users = kzalloc(alloc, GFP_KERNEL);
+ 	if (!state->users)
+ 		return -ENOMEM;

Modified: dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.5
==============================================================================
--- dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.5	(original)
+++ dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.5	Fri Sep  5 18:06:58 2008
@@ -7,3 +7,4 @@
 + bugfix/sctp-auth-key-length-check.patch
 + bugfix/tmpfs-fix-kernel-bug-in-shmem_delete_inode.patch
 + bugfix/iov_iter_advance-off-by-one.patch
++ bugfix/nfsd-fix-buffer-overrun-decoding-nfsv4-acl.patch



More information about the Kernel-svn-changes mailing list