From: Greg Kroah-Hartman Date: Sat, 15 Jul 2006 03:12:32 +0000 (-0700) Subject: 2.6.16.25 and 2.6.17.5 releases X-Git-Tag: v2.6.17.7~2^2~10 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=852a9dd86a1e1e2b4d6d967d6a8ccd85c2792d3a;p=thirdparty%2Fkernel%2Fstable-queue.git 2.6.16.25 and 2.6.17.5 releases --- diff --git a/releases/2.6.16.25/fix-nasty-proc-vulnerability.patch b/releases/2.6.16.25/fix-nasty-proc-vulnerability.patch new file mode 100644 index 00000000000..d0d20dc91d7 --- /dev/null +++ b/releases/2.6.16.25/fix-nasty-proc-vulnerability.patch @@ -0,0 +1,31 @@ +From git-commits-head-owner@vger.kernel.org Fri Jul 14 16:59:56 2006 +Date: Fri, 14 Jul 2006 23:59:02 GMT +Message-Id: <200607142359.k6ENx2iQ032185@hera.kernel.org> +From: Linus Torvalds +To: git-commits-head@vger.kernel.org +Subject: Fix nasty /proc vulnerability (CVE-2006-3626) + +Fix nasty /proc vulnerability + +We have a bad interaction with both the kernel and user space being able +to change some of the /proc file status. This fixes the most obvious +part of it, but I expect we'll also make it harder for users to modify +even their "own" files in /proc. + +Signed-off-by: Linus Torvalds +Signed-off-by: Greg Kroah-Hartman + +--- + fs/proc/base.c | 1 + + 1 file changed, 1 insertion(+) + +--- linux-2.6.16.24.orig/fs/proc/base.c ++++ linux-2.6.16.24/fs/proc/base.c +@@ -1366,6 +1366,7 @@ static int pid_revalidate(struct dentry + } else { + inode->i_uid = 0; + inode->i_gid = 0; ++ inode->i_mode = 0; + } + security_task_to_inode(task, inode); + return 1; diff --git a/releases/2.6.16.25/series b/releases/2.6.16.25/series new file mode 100644 index 00000000000..e8586440f08 --- /dev/null +++ b/releases/2.6.16.25/series @@ -0,0 +1 @@ +fix-nasty-proc-vulnerability.patch diff --git a/releases/2.6.17.5/fix-nasty-proc-vulnerability.patch b/releases/2.6.17.5/fix-nasty-proc-vulnerability.patch new file mode 100644 index 00000000000..cd184083c66 --- /dev/null +++ b/releases/2.6.17.5/fix-nasty-proc-vulnerability.patch @@ -0,0 +1,31 @@ +From git-commits-head-owner@vger.kernel.org Fri Jul 14 16:59:56 2006 +Date: Fri, 14 Jul 2006 23:59:02 GMT +Message-Id: <200607142359.k6ENx2iQ032185@hera.kernel.org> +From: Linus Torvalds +To: git-commits-head@vger.kernel.org +Subject: Fix nasty /proc vulnerability (CVE-2006-3626) + +Fix nasty /proc vulnerability + +We have a bad interaction with both the kernel and user space being able +to change some of the /proc file status. This fixes the most obvious +part of it, but I expect we'll also make it harder for users to modify +even their "own" files in /proc. + +Signed-off-by: Linus Torvalds +Signed-off-by: Greg Kroah-Hartman + +--- + fs/proc/base.c | 1 + + 1 file changed, 1 insertion(+) + +--- linux-2.6.17.4.orig/fs/proc/base.c ++++ linux-2.6.17.4/fs/proc/base.c +@@ -1404,6 +1404,7 @@ static int pid_revalidate(struct dentry + } else { + inode->i_uid = 0; + inode->i_gid = 0; ++ inode->i_mode = 0; + } + security_task_to_inode(task, inode); + return 1; diff --git a/releases/2.6.17.5/series b/releases/2.6.17.5/series new file mode 100644 index 00000000000..e8586440f08 --- /dev/null +++ b/releases/2.6.17.5/series @@ -0,0 +1 @@ +fix-nasty-proc-vulnerability.patch