Gentoo Archives: gentoo-commits

From: "Mike Pagano (mpagano)" <mpagano@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] linux-patches r2462 - genpatches-2.6/trunk/3.0
Date: Mon, 29 Jul 2013 17:09:14
Message-Id: 20130729170911.56B912171C@flycatcher.gentoo.org
1 Author: mpagano
2 Date: 2013-07-29 17:09:11 +0000 (Mon, 29 Jul 2013)
3 New Revision: 2462
4
5 Removed:
6 genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch
7 genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch
8 Modified:
9 genpatches-2.6/trunk/3.0/0000_README
10 Log:
11 Remove redundant patches
12
13 Modified: genpatches-2.6/trunk/3.0/0000_README
14 ===================================================================
15 --- genpatches-2.6/trunk/3.0/0000_README 2013-07-29 14:49:28 UTC (rev 2461)
16 +++ genpatches-2.6/trunk/3.0/0000_README 2013-07-29 17:09:11 UTC (rev 2462)
17 @@ -391,14 +391,6 @@
18 From: https://bugs.gentoo.org/show_bug.cgi?id=470644
19 Desc: Support for namespace user.pax.* on tmpfs.
20
21 -Patch: 1510_af_key-fix-info-leaks-in-notify-messages.patch
22 -From: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887
23 -Desc: af_key: fix info leaks in notify messages
24 -
25 -Patch: 1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch
26 -From: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a963a37d384d71ad43b3e9e79d68d42fbe0901f3
27 -Desc: ipv6: ip6_sk_dst_check() must not assume ipv6 dst
28 -
29 Patch: 1512_af_key-initialize-satype-in-key_notify_policy_flush.patch
30 From: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85dfb745ee40232876663ae206cba35f24ab2a40
31 Desc: af_key: initialize satype in key_notify_policy_flush()
32
33 Deleted: genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch
34 ===================================================================
35 --- genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch 2013-07-29 14:49:28 UTC (rev 2461)
36 +++ genpatches-2.6/trunk/3.0/1510_af_key-fix-info-leaks-in-notify-messages.patch 2013-07-29 17:09:11 UTC (rev 2462)
37 @@ -1,41 +0,0 @@
38 -From a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887 Mon Sep 17 00:00:00 2001
39 -From: Mathias Krause <minipli@××××××××××.com>
40 -Date: Wed, 26 Jun 2013 23:52:30 +0200
41 -Subject: [PATCH] af_key: fix info leaks in notify messages
42 -
43 -key_notify_sa_flush() and key_notify_policy_flush() miss to initialize
44 -the sadb_msg_reserved member of the broadcasted message and thereby
45 -leak 2 bytes of heap memory to listeners. Fix that.
46 -
47 -Signed-off-by: Mathias Krause <minipli@××××××××××.com>
48 -Cc: Steffen Klassert <steffen.klassert@×××××××.com>
49 -Cc: "David S. Miller" <davem@×××××××××.net>
50 -Cc: Herbert Xu <herbert@××××××××××××××××.au>
51 -Signed-off-by: David S. Miller <davem@×××××××××.net>
52 ----
53 - net/key/af_key.c | 2 ++
54 - 1 file changed, 2 insertions(+)
55 -
56 -diff --git a/net/key/af_key.c b/net/key/af_key.c
57 -index c5fbd75..9da8620 100644
58 ---- a/net/key/af_key.c
59 -+++ b/net/key/af_key.c
60 -@@ -1710,6 +1710,7 @@ static int key_notify_sa_flush(const struct km_event *c)
61 - hdr->sadb_msg_version = PF_KEY_V2;
62 - hdr->sadb_msg_errno = (uint8_t) 0;
63 - hdr->sadb_msg_len = (sizeof(struct sadb_msg) / sizeof(uint64_t));
64 -+ hdr->sadb_msg_reserved = 0;
65 -
66 - pfkey_broadcast(skb, GFP_ATOMIC, BROADCAST_ALL, NULL, c->net);
67 -
68 -@@ -2699,6 +2700,7 @@ static int key_notify_policy_flush(const struct km_event *c)
69 - hdr->sadb_msg_errno = (uint8_t) 0;
70 - hdr->sadb_msg_satype = SADB_SATYPE_UNSPEC;
71 - hdr->sadb_msg_len = (sizeof(struct sadb_msg) / sizeof(uint64_t));
72 -+ hdr->sadb_msg_reserved = 0;
73 - pfkey_broadcast(skb_out, GFP_ATOMIC, BROADCAST_ALL, NULL, c->net);
74 - return 0;
75 -
76 ---
77 -1.8.2.1
78 -
79
80 Deleted: genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch
81 ===================================================================
82 --- genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch 2013-07-29 14:49:28 UTC (rev 2461)
83 +++ genpatches-2.6/trunk/3.0/1511_ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch 2013-07-29 17:09:11 UTC (rev 2462)
84 @@ -1,52 +0,0 @@
85 -From a963a37d384d71ad43b3e9e79d68d42fbe0901f3 Mon Sep 17 00:00:00 2001
86 -From: Eric Dumazet <edumazet@××××××.com>
87 -Date: Wed, 26 Jun 2013 04:15:07 -0700
88 -Subject: [PATCH] ipv6: ip6_sk_dst_check() must not assume ipv6 dst
89 -
90 -It's possible to use AF_INET6 sockets and to connect to an IPv4
91 -destination. After this, socket dst cache is a pointer to a rtable,
92 -not rt6_info.
93 -
94 -ip6_sk_dst_check() should check the socket dst cache is IPv6, or else
95 -various corruptions/crashes can happen.
96 -
97 -Dave Jones can reproduce immediate crash with
98 -trinity -q -l off -n -c sendmsg -c connect
99 -
100 -With help from Hannes Frederic Sowa
101 -
102 -Reported-by: Dave Jones <davej@××××××.com>
103 -Reported-by: Hannes Frederic Sowa <hannes@×××××××××××××××.org>
104 -Signed-off-by: Eric Dumazet <edumazet@××××××.com>
105 -Acked-by: Hannes Frederic Sowa <hannes@×××××××××××××××.org>
106 -Signed-off-by: David S. Miller <davem@×××××××××.net>
107 ----
108 - net/ipv6/ip6_output.c | 8 +++++++-
109 - 1 file changed, 7 insertions(+), 1 deletion(-)
110 -
111 -diff --git a/net/ipv6/ip6_output.c b/net/ipv6/ip6_output.c
112 -index 95703ba..d5d20cd 100644
113 ---- a/net/ipv6/ip6_output.c
114 -+++ b/net/ipv6/ip6_output.c
115 -@@ -821,11 +821,17 @@ static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
116 - const struct flowi6 *fl6)
117 - {
118 - struct ipv6_pinfo *np = inet6_sk(sk);
119 -- struct rt6_info *rt = (struct rt6_info *)dst;
120 -+ struct rt6_info *rt;
121 -
122 - if (!dst)
123 - goto out;
124 -
125 -+ if (dst->ops->family != AF_INET6) {
126 -+ dst_release(dst);
127 -+ return NULL;
128 -+ }
129 -+
130 -+ rt = (struct rt6_info *)dst;
131 - /* Yes, checking route validity in not connected
132 - * case is not very simple. Take into account,
133 - * that we do not support routing by source, TOS,
134 ---
135 -1.8.2.1
136 -