[kernel] r14351 - in dists/lenny-security/linux-2.6/debian: . patches/bugfix/all patches/series
Dann Frazier
dannf at alioth.debian.org
Thu Oct 8 06:07:45 UTC 2009
Author: dannf
Date: Thu Oct 8 06:07:39 2009
New Revision: 14351
Log:
fix information leak in llc_ui_getname (CVE-2009-3001)
Added:
dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
Modified:
dists/lenny-security/linux-2.6/debian/changelog
dists/lenny-security/linux-2.6/debian/patches/series/19lenny1
Modified: dists/lenny-security/linux-2.6/debian/changelog
==============================================================================
--- dists/lenny-security/linux-2.6/debian/changelog Thu Oct 8 06:04:25 2009 (r14350)
+++ dists/lenny-security/linux-2.6/debian/changelog Thu Oct 8 06:07:39 2009 (r14351)
@@ -6,6 +6,7 @@
(CVE-2009-3290)
* selinux: prevent local users from bypassing mmap_min_addr
in unconfined domains (CVE-2009-2695)
+ * fix information leak in llc_ui_getname (CVE-2009-3001)
-- dann frazier <dannf at debian.org> Tue, 15 Sep 2009 22:54:06 -0600
Added: dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch Thu Oct 8 06:07:39 2009 (r14351)
@@ -0,0 +1,24 @@
+commit 28e9fc592cb8c7a43e4d3147b38be6032a0e81bc
+Author: Jiri Slaby <jirislaby at gmail.com>
+Date: Sun Aug 23 22:55:51 2009 -0700
+
+ NET: llc, zero sockaddr_llc struct
+
+ sllc_arphrd member of sockaddr_llc might not be changed. Zero sllc
+ before copying to the above layer's structure.
+
+ Signed-off-by: Jiri Slaby <jirislaby at gmail.com>
+ Signed-off-by: David S. Miller <davem at davemloft.net>
+
+diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c
+index 9208cf5..c45eee1 100644
+--- a/net/llc/af_llc.c
++++ b/net/llc/af_llc.c
+@@ -914,6 +914,7 @@ static int llc_ui_getname(struct socket *sock, struct sockaddr *uaddr,
+ struct llc_sock *llc = llc_sk(sk);
+ int rc = 0;
+
++ memset(&sllc, 0, sizeof(sllc));
+ lock_sock(sk);
+ if (sock_flag(sk, SOCK_ZAPPED))
+ goto out;
Modified: dists/lenny-security/linux-2.6/debian/patches/series/19lenny1
==============================================================================
--- dists/lenny-security/linux-2.6/debian/patches/series/19lenny1 Thu Oct 8 06:04:25 2009 (r14350)
+++ dists/lenny-security/linux-2.6/debian/patches/series/19lenny1 Thu Oct 8 06:07:39 2009 (r14351)
@@ -6,3 +6,4 @@
+ bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch
+ bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch
+ bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch
++ bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
More information about the Kernel-svn-changes
mailing list