[kernel] r12944 - in dists/etch-security/linux-2.6/debian: . patches/bugfix/mips patches/series
Dann Frazier
dannf at alioth.debian.org
Mon Feb 23 07:10:27 UTC 2009
Author: dannf
Date: Mon Feb 23 07:10:24 2009
New Revision: 12944
Log:
* [mips] Fix potential DOS by untrusted user app
- bugfix/mips/fix-potential-dos.patch
See CVE-2008-5701
Added:
dists/etch-security/linux-2.6/debian/patches/bugfix/mips/fix-potential-dos.patch
- copied, changed from r12852, /dists/etch-security/linux-2.6.24/debian/patches/bugfix/mips/fix-potential-dos.patch
Modified:
dists/etch-security/linux-2.6/debian/changelog
dists/etch-security/linux-2.6/debian/patches/series/24etch1
Modified: dists/etch-security/linux-2.6/debian/changelog
==============================================================================
--- dists/etch-security/linux-2.6/debian/changelog (original)
+++ dists/etch-security/linux-2.6/debian/changelog Mon Feb 23 07:10:24 2009
@@ -24,8 +24,11 @@
* NET: Add preemption point in qdisc_run
- bugfix/all/net-add-preempt-point-in-qdisc_run.patch
See CVE-2008-5713
+ * [mips] Fix potential DOS by untrusted user app
+ - bugfix/mips/fix-potential-dos.patch
+ See CVE-2008-5701
- -- dann frazier <dannf at debian.org> Sun, 22 Feb 2009 23:20:08 -0700
+ -- dann frazier <dannf at debian.org> Sun, 22 Feb 2009 23:59:19 -0700
linux-2.6 (2.6.18.dfsg.1-24) stable; urgency=high
Copied: dists/etch-security/linux-2.6/debian/patches/bugfix/mips/fix-potential-dos.patch (from r12852, /dists/etch-security/linux-2.6.24/debian/patches/bugfix/mips/fix-potential-dos.patch)
==============================================================================
--- /dists/etch-security/linux-2.6.24/debian/patches/bugfix/mips/fix-potential-dos.patch (original)
+++ dists/etch-security/linux-2.6/debian/patches/bugfix/mips/fix-potential-dos.patch Mon Feb 23 07:10:24 2009
@@ -19,11 +19,12 @@
(cherry picked from commit 24f8c295c60d135ba058eecf9b85a521ed2d50a3)
---
-diff --git a/arch/mips/kernel/scall32-o32.S b/arch/mips/kernel/scall32-o32.S
-index 6aa1400..fb116bf 100644
---- a/arch/mips/kernel/scall32-o32.S
-+++ b/arch/mips/kernel/scall32-o32.S
-@@ -270,18 +270,11 @@ bad_alignment:
+Adjusted to apply to Debian's 2.6.18 by dann frazier <danf at debian.org>
+
+diff -urpN linux-source-2.6.18.orig/arch/mips/kernel/scall32-o32.S linux-source-2.6.18/arch/mips/kernel/scall32-o32.S
+--- linux-source-2.6.18.orig/arch/mips/kernel/scall32-o32.S 2006-09-19 21:42:06.000000000 -0600
++++ linux-source-2.6.18/arch/mips/kernel/scall32-o32.S 2009-02-22 23:45:02.000000000 -0700
+@@ -281,18 +281,11 @@ bad_alignment:
subu t0, a0, __NR_O32_Linux # check syscall number
sltiu v0, t0, __NR_O32_Linux_syscalls + 1
#endif
@@ -43,10 +44,9 @@
/* Some syscalls like execve get their arguments from struct pt_regs
and claim zero arguments in the syscall table. Thus we have to
assume the worst case and shuffle around all potential arguments.
-diff --git a/arch/mips/kernel/scall64-o32.S b/arch/mips/kernel/scall64-o32.S
-index 9a275ef..8dce4c2 100644
---- a/arch/mips/kernel/scall64-o32.S
-+++ b/arch/mips/kernel/scall64-o32.S
+diff -urpN linux-source-2.6.18.orig/arch/mips/kernel/scall64-o32.S linux-source-2.6.18/arch/mips/kernel/scall64-o32.S
+--- linux-source-2.6.18.orig/arch/mips/kernel/scall64-o32.S 2008-12-25 14:04:12.000000000 -0700
++++ linux-source-2.6.18/arch/mips/kernel/scall64-o32.S 2009-02-22 23:45:02.000000000 -0700
@@ -174,14 +174,12 @@ not_o32_scall:
END(handle_sys)
Modified: dists/etch-security/linux-2.6/debian/patches/series/24etch1
==============================================================================
--- dists/etch-security/linux-2.6/debian/patches/series/24etch1 (original)
+++ dists/etch-security/linux-2.6/debian/patches/series/24etch1 Mon Feb 23 07:10:24 2009
@@ -58,3 +58,4 @@
+ bugfix/all/dell_rbu-use-scnprintf-instead-of-sprintf.patch
+ bugfix/hppa/userspace-unwind-crash.patch
+ bugfix/all/net-add-preempt-point-in-qdisc_run.patch
++ bugfix/mips/fix-potential-dos.patch
More information about the Kernel-svn-changes
mailing list