[kernel] r14351 - in dists/lenny-security/linux-2.6/debian: . patches/bugfix/all patches/series

Dann Frazier dannf at alioth.debian.org
Thu Oct 8 06:07:45 UTC 2009


Author: dannf
Date: Thu Oct  8 06:07:39 2009
New Revision: 14351

Log:
fix information leak in llc_ui_getname (CVE-2009-3001)

Added:
   dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
Modified:
   dists/lenny-security/linux-2.6/debian/changelog
   dists/lenny-security/linux-2.6/debian/patches/series/19lenny1

Modified: dists/lenny-security/linux-2.6/debian/changelog
==============================================================================
--- dists/lenny-security/linux-2.6/debian/changelog	Thu Oct  8 06:04:25 2009	(r14350)
+++ dists/lenny-security/linux-2.6/debian/changelog	Thu Oct  8 06:07:39 2009	(r14351)
@@ -6,6 +6,7 @@
     (CVE-2009-3290)
   * selinux: prevent local users from bypassing mmap_min_addr
     in unconfined domains (CVE-2009-2695)
+  * fix information leak in llc_ui_getname (CVE-2009-3001)
 
  -- dann frazier <dannf at debian.org>  Tue, 15 Sep 2009 22:54:06 -0600
 

Added: dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch	Thu Oct  8 06:07:39 2009	(r14351)
@@ -0,0 +1,24 @@
+commit 28e9fc592cb8c7a43e4d3147b38be6032a0e81bc
+Author: Jiri Slaby <jirislaby at gmail.com>
+Date:   Sun Aug 23 22:55:51 2009 -0700
+
+    NET: llc, zero sockaddr_llc struct
+    
+    sllc_arphrd member of sockaddr_llc might not be changed. Zero sllc
+    before copying to the above layer's structure.
+    
+    Signed-off-by: Jiri Slaby <jirislaby at gmail.com>
+    Signed-off-by: David S. Miller <davem at davemloft.net>
+
+diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c
+index 9208cf5..c45eee1 100644
+--- a/net/llc/af_llc.c
++++ b/net/llc/af_llc.c
+@@ -914,6 +914,7 @@ static int llc_ui_getname(struct socket *sock, struct sockaddr *uaddr,
+ 	struct llc_sock *llc = llc_sk(sk);
+ 	int rc = 0;
+ 
++	memset(&sllc, 0, sizeof(sllc));
+ 	lock_sock(sk);
+ 	if (sock_flag(sk, SOCK_ZAPPED))
+ 		goto out;

Modified: dists/lenny-security/linux-2.6/debian/patches/series/19lenny1
==============================================================================
--- dists/lenny-security/linux-2.6/debian/patches/series/19lenny1	Thu Oct  8 06:04:25 2009	(r14350)
+++ dists/lenny-security/linux-2.6/debian/patches/series/19lenny1	Thu Oct  8 06:07:39 2009	(r14351)
@@ -6,3 +6,4 @@
 + bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch
 + bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch
 + bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch
++ bugfix/all/net-llc-zero-sockaddr_llc-struct.patch



More information about the Kernel-svn-changes mailing list