[kernel] r14552 - in dists/etch-security/linux-2.6.24/debian: . patches/bugfix/all patches/series
Dann Frazier
dannf at alioth.debian.org
Wed Nov 4 21:14:38 UTC 2009
Author: dannf
Date: Wed Nov 4 21:14:37 2009
New Revision: 14552
Log:
fix information leak in llc_ui_getname (CVE-2009-3001)
Added:
dists/etch-security/linux-2.6.24/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
- copied unchanged from r14544, dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
Modified:
dists/etch-security/linux-2.6.24/debian/changelog
dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch4
Modified: dists/etch-security/linux-2.6.24/debian/changelog
==============================================================================
--- dists/etch-security/linux-2.6.24/debian/changelog Wed Nov 4 21:10:34 2009 (r14551)
+++ dists/etch-security/linux-2.6.24/debian/changelog Wed Nov 4 21:14:37 2009 (r14552)
@@ -19,6 +19,7 @@
* net ax25: Fix signed comparison in the sockopt handler (CVE-2009-2909)
* x86: Don't leak 64-bit kernel register values to 32-bit processes
(CVE-2009-2910)
+ * fix information leak in llc_ui_getname (CVE-2009-3001)
-- dann frazier <dannf at debian.org> Tue, 27 Oct 2009 22:41:25 -0600
Copied: dists/etch-security/linux-2.6.24/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch (from r14544, dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch)
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ dists/etch-security/linux-2.6.24/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch Wed Nov 4 21:14:37 2009 (r14552, copy of r14544, dists/lenny-security/linux-2.6/debian/patches/bugfix/all/net-llc-zero-sockaddr_llc-struct.patch)
@@ -0,0 +1,24 @@
+commit 28e9fc592cb8c7a43e4d3147b38be6032a0e81bc
+Author: Jiri Slaby <jirislaby at gmail.com>
+Date: Sun Aug 23 22:55:51 2009 -0700
+
+ NET: llc, zero sockaddr_llc struct
+
+ sllc_arphrd member of sockaddr_llc might not be changed. Zero sllc
+ before copying to the above layer's structure.
+
+ Signed-off-by: Jiri Slaby <jirislaby at gmail.com>
+ Signed-off-by: David S. Miller <davem at davemloft.net>
+
+diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c
+index 9208cf5..c45eee1 100644
+--- a/net/llc/af_llc.c
++++ b/net/llc/af_llc.c
+@@ -914,6 +914,7 @@ static int llc_ui_getname(struct socket *sock, struct sockaddr *uaddr,
+ struct llc_sock *llc = llc_sk(sk);
+ int rc = 0;
+
++ memset(&sllc, 0, sizeof(sllc));
+ lock_sock(sk);
+ if (sock_flag(sk, SOCK_ZAPPED))
+ goto out;
Modified: dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch4
==============================================================================
--- dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch4 Wed Nov 4 21:10:34 2009 (r14551)
+++ dists/etch-security/linux-2.6.24/debian/patches/series/6~etchnhalf.8etch4 Wed Nov 4 21:14:37 2009 (r14552)
@@ -13,3 +13,4 @@
+ bugfix/all/net-ax25-fix-signed-comparison-in-the-sockopt-handler.patch
+ bugfix/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch
+ bugfix/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch
++ bugfix/all/net-llc-zero-sockaddr_llc-struct.patch
More information about the Kernel-svn-changes
mailing list