[kernel] r17615 - in dists/lenny-security/linux-2.6/debian: . patches/bugfix/all patches/series
Dann Frazier
dannf at alioth.debian.org
Mon Jun 6 03:31:37 UTC 2011
Author: dannf
Date: Mon Jun 6 03:31:36 2011
New Revision: 17615
Log:
Improve fix for buffer overflow in ldm_frag_add (CVE-2011-2182)
Added:
dists/lenny-security/linux-2.6/debian/patches/bugfix/all/fix-for-buffer-overflow-in-ldm_frag_add-not-sufficient.patch
Modified:
dists/lenny-security/linux-2.6/debian/changelog
dists/lenny-security/linux-2.6/debian/patches/series/26lenny3
Modified: dists/lenny-security/linux-2.6/debian/changelog
==============================================================================
--- dists/lenny-security/linux-2.6/debian/changelog Mon Jun 6 03:30:23 2011 (r17614)
+++ dists/lenny-security/linux-2.6/debian/changelog Mon Jun 6 03:31:36 2011 (r17615)
@@ -43,6 +43,7 @@
* Validate size of EFI GUID partition entries (CVE-2011-1776)
* fs/partitions/ldm.c: fix oops caused by corrupted partition table
(CVE-2011-1017)
+ * Improve fix for buffer overflow in ldm_frag_add (CVE-2011-2182)
[ Ben Hutchings ]
* [vserver] Complete fix for CVE-2010-4243 (Closes: #618485)
Added: dists/lenny-security/linux-2.6/debian/patches/bugfix/all/fix-for-buffer-overflow-in-ldm_frag_add-not-sufficient.patch
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ dists/lenny-security/linux-2.6/debian/patches/bugfix/all/fix-for-buffer-overflow-in-ldm_frag_add-not-sufficient.patch Mon Jun 6 03:31:36 2011 (r17615)
@@ -0,0 +1,34 @@
+commit cae13fe4cc3f24820ffb990c09110626837e85d4
+Author: Timo Warns <Warns at pre-sense.de>
+Date: Thu May 19 09:24:17 2011 +0200
+
+ Fix for buffer overflow in ldm_frag_add not sufficient
+
+ As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
+ overflow in ldm_frag_add) is not sufficient. The original patch in
+ commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
+ partition table") does not consider that, for subsequent fragments,
+ previously allocated memory is used.
+
+ [1] http://lkml.org/lkml/2011/5/6/407
+
+ Reported-by: Ben Hutchings <ben at decadent.org.uk>
+ Signed-off-by: Timo Warns <warns at pre-sense.de>
+ Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
+
+diff --git a/fs/partitions/ldm.c b/fs/partitions/ldm.c
+index ce4f624..a29d5cc 100644
+--- a/fs/partitions/ldm.c
++++ b/fs/partitions/ldm.c
+@@ -1335,6 +1335,11 @@ static bool ldm_frag_add (const u8 *data, int size, struct list_head *frags)
+
+ list_add_tail (&f->list, frags);
+ found:
++ if (rec >= f->num) {
++ ldm_error("REC value (%d) exceeds NUM value (%d)", rec, f->num);
++ return false;
++ }
++
+ if (f->map & (1 << rec)) {
+ ldm_error ("Duplicate VBLK, part %d.", rec);
+ f->map &= 0x7F; /* Mark the group as broken */
Modified: dists/lenny-security/linux-2.6/debian/patches/series/26lenny3
==============================================================================
--- dists/lenny-security/linux-2.6/debian/patches/series/26lenny3 Mon Jun 6 03:30:23 2011 (r17614)
+++ dists/lenny-security/linux-2.6/debian/patches/series/26lenny3 Mon Jun 6 03:31:36 2011 (r17615)
@@ -40,3 +40,4 @@
+ bugfix/all/gre-fix-netns-vs-proto-registration-ordering.patch
+ bugfix/all/validate-size-of-efi-guid-partition-entries.patch
+ bugfix/all/partitions-ldm-fix-oops-caused-by-corrupted-partition-table.patch
++ bugfix/all/fix-for-buffer-overflow-in-ldm_frag_add-not-sufficient.patch
More information about the Kernel-svn-changes
mailing list