[kernel] r13339 - in dists/etch-security/linux-2.6.24/debian: . patches/bugfix/all patches/series
Dann Frazier
dannf at alioth.debian.org
Mon Apr 6 03:52:52 UTC 2009
Author: dannf
Date: Mon Apr 6 03:52:50 2009
New Revision: 13339
Log:
copy_process: fix CLONE_PARENT && parent_exec_id interaction
(CVE-2009-0028)
Added:
dists/etch-security/linux-2.6.24/debian/patches/bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch
- copied, changed from r13324, dists/lenny-security/linux-2.6/debian/patches/bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch
Modified:
dists/etch-security/linux-2.6.24/debian/changelog
dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch1
Modified: dists/etch-security/linux-2.6.24/debian/changelog
==============================================================================
--- dists/etch-security/linux-2.6.24/debian/changelog Mon Apr 6 02:53:15 2009 (r13338)
+++ dists/etch-security/linux-2.6.24/debian/changelog Mon Apr 6 03:52:50 2009 (r13339)
@@ -15,6 +15,8 @@
* [hppa] Fix system crash while unwinding a userspace process
(CVE-2008-5395)
* Fix sensitive memory leak in SO_BSDCOMPAT gsopt (CVE-2009-0676)
+ * copy_process: fix CLONE_PARENT && parent_exec_id interaction
+ (CVE-2009-0028)
-- dann frazier <dannf at debian.org> Tue, 24 Feb 2009 23:25:36 -0700
Copied and modified: dists/etch-security/linux-2.6.24/debian/patches/bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch (from r13324, dists/lenny-security/linux-2.6/debian/patches/bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch)
==============================================================================
--- dists/lenny-security/linux-2.6/debian/patches/bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch Sat Apr 4 01:14:40 2009 (r13324, copy source)
+++ dists/etch-security/linux-2.6.24/debian/patches/bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch Mon Apr 6 03:52:50 2009 (r13339)
@@ -19,13 +19,14 @@
Cc: Serge E. Hallyn <serge at hallyn.com>
Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
-Adjusted to apply to Debian's 2.6.26 by dann frazier <dannf at debian.org>
-diff -urpN linux-source-2.6.26.orig/kernel/fork.c linux-source-2.6.26/kernel/fork.c
---- linux-source-2.6.26.orig/kernel/fork.c 2009-03-25 17:20:41.000000000 -0600
-+++ linux-source-2.6.26/kernel/fork.c 2009-04-03 19:10:19.000000000 -0600
-@@ -1109,10 +1109,6 @@ static struct task_struct *copy_process(
+Adjusted to apply to Debian's 2.6.24 by dann frazier <dannf at debian.org>
+
+diff -urpN a/kernel/fork.c b/kernel/fork.c
+--- a/kernel/fork.c 2009-04-05 19:32:23.000000000 -0600
++++ b/kernel/fork.c 2009-04-05 21:46:39.000000000 -0600
+@@ -1197,10 +1197,6 @@ static struct task_struct *copy_process(
+ clear_tsk_thread_flag(p, TIF_SYSCALL_EMU);
#endif
- clear_all_latency_tracing(p);
- /* Our parent execution domain becomes current domain
- These must match for thread signalling to apply */
@@ -34,7 +35,7 @@
/* ok, now we should be set up.. */
p->exit_signal = (clone_flags & CLONE_THREAD) ? -1 : (clone_flags & CSIGNAL);
p->pdeath_signal = 0;
-@@ -1152,10 +1148,13 @@ static struct task_struct *copy_process(
+@@ -1242,10 +1238,13 @@ static struct task_struct *copy_process(
set_task_cpu(p, smp_processor_id());
/* CLONE_PARENT re-uses the old parent */
Modified: dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch1
==============================================================================
--- dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch1 Mon Apr 6 02:53:15 2009 (r13338)
+++ dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch1 Mon Apr 6 03:52:50 2009 (r13339)
@@ -71,3 +71,4 @@
+ bugfix/all/CVE-2009-0029/sparc64-wrap-arch-specific-syscalls.patch
+ bugfix/all/CVE-2009-0029/fix-uml-compile.patch
+ bugfix/all/CVE-2009-0029/compat-zero-upper-32bits-of-offset_high-and-offset_low.patch
++ bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch
More information about the Kernel-svn-changes
mailing list