1 |
Author: mpagano |
2 |
Date: 2013-07-29 17:09:11 +0000 (Mon, 29 Jul 2013) |
3 |
New Revision: 2462 |
4 |
|
5 |
Removed: |
6 |
genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch |
7 |
genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch |
8 |
Modified: |
9 |
genpatches-2.6/trunk/3.0/0000_README |
10 |
Log: |
11 |
Remove redundant patches |
12 |
|
13 |
Modified: genpatches-2.6/trunk/3.0/0000_README |
14 |
=================================================================== |
15 |
--- genpatches-2.6/trunk/3.0/0000_README 2013-07-29 14:49:28 UTC (rev 2461) |
16 |
+++ genpatches-2.6/trunk/3.0/0000_README 2013-07-29 17:09:11 UTC (rev 2462) |
17 |
@@ -391,14 +391,6 @@ |
18 |
From: https://bugs.gentoo.org/show_bug.cgi?id=470644 |
19 |
Desc: Support for namespace user.pax.* on tmpfs. |
20 |
|
21 |
-Patch: 1510_af_key-fix-info-leaks-in-notify-messages.patch |
22 |
-From: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887 |
23 |
-Desc: af_key: fix info leaks in notify messages |
24 |
- |
25 |
-Patch: 1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch |
26 |
-From: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a963a37d384d71ad43b3e9e79d68d42fbe0901f3 |
27 |
-Desc: ipv6: ip6_sk_dst_check() must not assume ipv6 dst |
28 |
- |
29 |
Patch: 1512_af_key-initialize-satype-in-key_notify_policy_flush.patch |
30 |
From: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85dfb745ee40232876663ae206cba35f24ab2a40 |
31 |
Desc: af_key: initialize satype in key_notify_policy_flush() |
32 |
|
33 |
Deleted: genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch |
34 |
=================================================================== |
35 |
--- genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch 2013-07-29 14:49:28 UTC (rev 2461) |
36 |
+++ genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch 2013-07-29 17:09:11 UTC (rev 2462) |
37 |
@@ -1,41 +0,0 @@ |
38 |
-From a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887 Mon Sep 17 00:00:00 2001 |
39 |
-From: Mathias Krause <minipli@××××××××××.com> |
40 |
-Date: Wed, 26 Jun 2013 23:52:30 +0200 |
41 |
-Subject: [PATCH] af_key: fix info leaks in notify messages |
42 |
- |
43 |
-key_notify_sa_flush() and key_notify_policy_flush() miss to initialize |
44 |
-the sadb_msg_reserved member of the broadcasted message and thereby |
45 |
-leak 2 bytes of heap memory to listeners. Fix that. |
46 |
- |
47 |
-Signed-off-by: Mathias Krause <minipli@××××××××××.com> |
48 |
-Cc: Steffen Klassert <steffen.klassert@×××××××.com> |
49 |
-Cc: "David S. Miller" <davem@×××××××××.net> |
50 |
-Cc: Herbert Xu <herbert@××××××××××××××××.au> |
51 |
-Signed-off-by: David S. Miller <davem@×××××××××.net> |
52 |
---- |
53 |
- net/key/af_key.c | 2 ++ |
54 |
- 1 file changed, 2 insertions(+) |
55 |
- |
56 |
-diff --git a/net/key/af_key.c b/net/key/af_key.c |
57 |
-index c5fbd75..9da8620 100644 |
58 |
---- a/net/key/af_key.c |
59 |
-+++ b/net/key/af_key.c |
60 |
-@@ -1710,6 +1710,7 @@ static int key_notify_sa_flush(const struct km_event *c) |
61 |
- hdr->sadb_msg_version = PF_KEY_V2; |
62 |
- hdr->sadb_msg_errno = (uint8_t) 0; |
63 |
- hdr->sadb_msg_len = (sizeof(struct sadb_msg) / sizeof(uint64_t)); |
64 |
-+ hdr->sadb_msg_reserved = 0; |
65 |
- |
66 |
- pfkey_broadcast(skb, GFP_ATOMIC, BROADCAST_ALL, NULL, c->net); |
67 |
- |
68 |
-@@ -2699,6 +2700,7 @@ static int key_notify_policy_flush(const struct km_event *c) |
69 |
- hdr->sadb_msg_errno = (uint8_t) 0; |
70 |
- hdr->sadb_msg_satype = SADB_SATYPE_UNSPEC; |
71 |
- hdr->sadb_msg_len = (sizeof(struct sadb_msg) / sizeof(uint64_t)); |
72 |
-+ hdr->sadb_msg_reserved = 0; |
73 |
- pfkey_broadcast(skb_out, GFP_ATOMIC, BROADCAST_ALL, NULL, c->net); |
74 |
- return 0; |
75 |
- |
76 |
--- |
77 |
-1.8.2.1 |
78 |
- |
79 |
|
80 |
Deleted: genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch |
81 |
=================================================================== |
82 |
--- genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch 2013-07-29 14:49:28 UTC (rev 2461) |
83 |
+++ genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch 2013-07-29 17:09:11 UTC (rev 2462) |
84 |
@@ -1,52 +0,0 @@ |
85 |
-From a963a37d384d71ad43b3e9e79d68d42fbe0901f3 Mon Sep 17 00:00:00 2001 |
86 |
-From: Eric Dumazet <edumazet@××××××.com> |
87 |
-Date: Wed, 26 Jun 2013 04:15:07 -0700 |
88 |
-Subject: [PATCH] ipv6: ip6_sk_dst_check() must not assume ipv6 dst |
89 |
- |
90 |
-It's possible to use AF_INET6 sockets and to connect to an IPv4 |
91 |
-destination. After this, socket dst cache is a pointer to a rtable, |
92 |
-not rt6_info. |
93 |
- |
94 |
-ip6_sk_dst_check() should check the socket dst cache is IPv6, or else |
95 |
-various corruptions/crashes can happen. |
96 |
- |
97 |
-Dave Jones can reproduce immediate crash with |
98 |
-trinity -q -l off -n -c sendmsg -c connect |
99 |
- |
100 |
-With help from Hannes Frederic Sowa |
101 |
- |
102 |
-Reported-by: Dave Jones <davej@××××××.com> |
103 |
-Reported-by: Hannes Frederic Sowa <hannes@×××××××××××××××.org> |
104 |
-Signed-off-by: Eric Dumazet <edumazet@××××××.com> |
105 |
-Acked-by: Hannes Frederic Sowa <hannes@×××××××××××××××.org> |
106 |
-Signed-off-by: David S. Miller <davem@×××××××××.net> |
107 |
---- |
108 |
- net/ipv6/ip6_output.c | 8 +++++++- |
109 |
- 1 file changed, 7 insertions(+), 1 deletion(-) |
110 |
- |
111 |
-diff --git a/net/ipv6/ip6_output.c b/net/ipv6/ip6_output.c |
112 |
-index 95703ba..d5d20cd 100644 |
113 |
---- a/net/ipv6/ip6_output.c |
114 |
-+++ b/net/ipv6/ip6_output.c |
115 |
-@@ -821,11 +821,17 @@ static struct dst_entry *ip6_sk_dst_check(struct sock *sk, |
116 |
- const struct flowi6 *fl6) |
117 |
- { |
118 |
- struct ipv6_pinfo *np = inet6_sk(sk); |
119 |
-- struct rt6_info *rt = (struct rt6_info *)dst; |
120 |
-+ struct rt6_info *rt; |
121 |
- |
122 |
- if (!dst) |
123 |
- goto out; |
124 |
- |
125 |
-+ if (dst->ops->family != AF_INET6) { |
126 |
-+ dst_release(dst); |
127 |
-+ return NULL; |
128 |
-+ } |
129 |
-+ |
130 |
-+ rt = (struct rt6_info *)dst; |
131 |
- /* Yes, checking route validity in not connected |
132 |
- * case is not very simple. Take into account, |
133 |
- * that we do not support routing by source, TOS, |
134 |
--- |
135 |
-1.8.2.1 |
136 |
- |