[kernel] r12944 - in dists/etch-security/linux-2.6/debian: . patches/bugfix/mips patches/series

Dann Frazier dannf at alioth.debian.org
Mon Feb 23 07:10:27 UTC 2009


Author: dannf
Date: Mon Feb 23 07:10:24 2009
New Revision: 12944

Log:
* [mips] Fix potential DOS by untrusted user app
   - bugfix/mips/fix-potential-dos.patch
  See CVE-2008-5701

Added:
   dists/etch-security/linux-2.6/debian/patches/bugfix/mips/fix-potential-dos.patch
      - copied, changed from r12852, /dists/etch-security/linux-2.6.24/debian/patches/bugfix/mips/fix-potential-dos.patch
Modified:
   dists/etch-security/linux-2.6/debian/changelog
   dists/etch-security/linux-2.6/debian/patches/series/24etch1

Modified: dists/etch-security/linux-2.6/debian/changelog
==============================================================================
--- dists/etch-security/linux-2.6/debian/changelog	(original)
+++ dists/etch-security/linux-2.6/debian/changelog	Mon Feb 23 07:10:24 2009
@@ -24,8 +24,11 @@
   * NET: Add preemption point in qdisc_run
      - bugfix/all/net-add-preempt-point-in-qdisc_run.patch
     See CVE-2008-5713
+  * [mips] Fix potential DOS by untrusted user app
+     - bugfix/mips/fix-potential-dos.patch
+    See CVE-2008-5701
 
- -- dann frazier <dannf at debian.org>  Sun, 22 Feb 2009 23:20:08 -0700
+ -- dann frazier <dannf at debian.org>  Sun, 22 Feb 2009 23:59:19 -0700
 
 linux-2.6 (2.6.18.dfsg.1-24) stable; urgency=high
 

Copied: dists/etch-security/linux-2.6/debian/patches/bugfix/mips/fix-potential-dos.patch (from r12852, /dists/etch-security/linux-2.6.24/debian/patches/bugfix/mips/fix-potential-dos.patch)
==============================================================================
--- /dists/etch-security/linux-2.6.24/debian/patches/bugfix/mips/fix-potential-dos.patch	(original)
+++ dists/etch-security/linux-2.6/debian/patches/bugfix/mips/fix-potential-dos.patch	Mon Feb 23 07:10:24 2009
@@ -19,11 +19,12 @@
 (cherry picked from commit 24f8c295c60d135ba058eecf9b85a521ed2d50a3)
 ---
 
-diff --git a/arch/mips/kernel/scall32-o32.S b/arch/mips/kernel/scall32-o32.S
-index 6aa1400..fb116bf 100644
---- a/arch/mips/kernel/scall32-o32.S
-+++ b/arch/mips/kernel/scall32-o32.S
-@@ -270,18 +270,11 @@ bad_alignment:
+Adjusted to apply to Debian's 2.6.18 by dann frazier <danf at debian.org>
+
+diff -urpN linux-source-2.6.18.orig/arch/mips/kernel/scall32-o32.S linux-source-2.6.18/arch/mips/kernel/scall32-o32.S
+--- linux-source-2.6.18.orig/arch/mips/kernel/scall32-o32.S	2006-09-19 21:42:06.000000000 -0600
++++ linux-source-2.6.18/arch/mips/kernel/scall32-o32.S	2009-02-22 23:45:02.000000000 -0700
+@@ -281,18 +281,11 @@ bad_alignment:
  	subu	t0, a0, __NR_O32_Linux	# check syscall number
  	sltiu	v0, t0, __NR_O32_Linux_syscalls + 1
  #endif
@@ -43,10 +44,9 @@
  	/* Some syscalls like execve get their arguments from struct pt_regs
  	   and claim zero arguments in the syscall table. Thus we have to
  	   assume the worst case and shuffle around all potential arguments.
-diff --git a/arch/mips/kernel/scall64-o32.S b/arch/mips/kernel/scall64-o32.S
-index 9a275ef..8dce4c2 100644
---- a/arch/mips/kernel/scall64-o32.S
-+++ b/arch/mips/kernel/scall64-o32.S
+diff -urpN linux-source-2.6.18.orig/arch/mips/kernel/scall64-o32.S linux-source-2.6.18/arch/mips/kernel/scall64-o32.S
+--- linux-source-2.6.18.orig/arch/mips/kernel/scall64-o32.S	2008-12-25 14:04:12.000000000 -0700
++++ linux-source-2.6.18/arch/mips/kernel/scall64-o32.S	2009-02-22 23:45:02.000000000 -0700
 @@ -174,14 +174,12 @@ not_o32_scall:
  	END(handle_sys)
  

Modified: dists/etch-security/linux-2.6/debian/patches/series/24etch1
==============================================================================
--- dists/etch-security/linux-2.6/debian/patches/series/24etch1	(original)
+++ dists/etch-security/linux-2.6/debian/patches/series/24etch1	Mon Feb 23 07:10:24 2009
@@ -58,3 +58,4 @@
 + bugfix/all/dell_rbu-use-scnprintf-instead-of-sprintf.patch
 + bugfix/hppa/userspace-unwind-crash.patch
 + bugfix/all/net-add-preempt-point-in-qdisc_run.patch
++ bugfix/mips/fix-potential-dos.patch



More information about the Kernel-svn-changes mailing list