[kernel] r15166 - in dists/etch-security/linux-2.6/debian: . patches/bugfix/all patches/series

Dann Frazier dannf at alioth.debian.org
Tue Feb 16 04:16:09 UTC 2010


Author: dannf
Date: Tue Feb 16 04:16:07 2010
New Revision: 15166

Log:
fuse: prevent fuse_put_request on invalid pointer (CVE-2009-4021)

Added:
   dists/etch-security/linux-2.6/debian/patches/bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch
Modified:
   dists/etch-security/linux-2.6/debian/changelog
   dists/etch-security/linux-2.6/debian/patches/series/26etch2

Modified: dists/etch-security/linux-2.6/debian/changelog
==============================================================================
--- dists/etch-security/linux-2.6/debian/changelog	Tue Feb 16 03:45:59 2010	(r15165)
+++ dists/etch-security/linux-2.6/debian/changelog	Tue Feb 16 04:16:07 2010	(r15166)
@@ -5,6 +5,7 @@
     (CVE-2009-3726)
   * isdn: hfc_usb: Fix read buffer overflow (CVE-2009-4005)
   * hfs: fix a potential buffer overflow (CVE-2009-4020)
+  * fuse: prevent fuse_put_request on invalid pointer (CVE-2009-4021)
 
  -- dann frazier <dannf at debian.org>  Mon, 15 Feb 2010 18:32:14 -0700
 

Added: dists/etch-security/linux-2.6/debian/patches/bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ dists/etch-security/linux-2.6/debian/patches/bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch	Tue Feb 16 04:16:07 2010	(r15166)
@@ -0,0 +1,25 @@
+commit d3b0f009da0c56490efe58279a7656a613a36b6a
+Author: dann frazier <dannf at hp.com>
+Date:   Mon Feb 15 21:11:56 2010 -0700
+
+    [Adjusted to apply to Debian's 2.6.18]
+    commit f60311d5f7670d9539b424e4ed8b5c0872fc9e83
+    Author: Anand V. Avati <avati at gluster.com>
+    Date:   Thu Oct 22 06:24:52 2009 -0700
+    
+        fuse: prevent fuse_put_request on invalid pointer
+
+diff --git a/fs/fuse/file.c b/fs/fuse/file.c
+index 4e174c8..b39ddee 100644
+--- a/fs/fuse/file.c
++++ b/fs/fuse/file.c
+@@ -586,7 +586,8 @@ static ssize_t fuse_direct_io(struct file *file, const char __user *buf,
+ 				break;
+ 		}
+ 	}
+-	fuse_put_request(fc, req);
++	if (!IS_ERR(req))
++		fuse_put_request(fc, req);
+ 	if (res > 0) {
+ 		if (write) {
+ 			spin_lock(&fc->lock);

Modified: dists/etch-security/linux-2.6/debian/patches/series/26etch2
==============================================================================
--- dists/etch-security/linux-2.6/debian/patches/series/26etch2	Tue Feb 16 03:45:59 2010	(r15165)
+++ dists/etch-security/linux-2.6/debian/patches/series/26etch2	Tue Feb 16 04:16:07 2010	(r15166)
@@ -2,3 +2,4 @@
 + bugfix/all/nfsv4-buggy-server-oops.patch
 + bugfix/all/isdn-hfc_usb-fix-read-buffer-overflow.patch
 + bugfix/all/hfs-fix-a-potential-buffer-overflow.patch
++ bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch



More information about the Kernel-svn-changes mailing list