debian/arch/i386/config.486-vyatta | 33 ++++-----------------------------
drivers/net/pppol2tp.c | 20 ++++++++++++--------
2 files changed, 16 insertions(+), 37 deletions(-)
New commits:
commit 2b2758facdb3f3587488b23d3100581b867715f3
Author: James Chapman <[EMAIL PROTECTED]>
Date: Tue Jun 10 12:35:00 2008 -0700
l2tp: Fix potential memory corruption in pppol2tp_recvmsg()
This patch fixes a potential memory corruption in
pppol2tp_recvmsg(). If skb->len is bigger than the caller's buffer
length, memcpy_toiovec() will go into unintialized data on the kernel
heap, interpret it as an iovec and start modifying memory.
The fix is to change the memcpy_toiovec() call to
skb_copy_datagram_iovec() so that paged packets (rare for PPPOL2TP)
are handled properly. Also check that the caller's buffer is big
enough for the data and set the MSG_TRUNC flag if it is not so.
Reported-by: Ilja <[EMAIL PROTECTED]>
Signed-off-by: James Chapman <[EMAIL PROTECTED]>
Signed-off-by: David S. Miller <[EMAIL PROTECTED]>
commit ecbc25f3fe237ca598f676098890e69efcd27fbb
Author: Stephen Hemminger <[EMAIL PROTECTED]>
Date: Thu Jul 17 14:06:05 2008 -0700
Disable SCTP and DCCP
Avoid running into security problems from buffer overflows in these
protocols. They weren't enabled before so it is not a big loss.
See: CVE-2008-2358, CVE-2008-2826
Revert "Enable TIPC, SCTP and DCCP protocols"
This reverts commit 2947723d7b21fa3a54de84228a9e971c449611a3.
http://suva.vyatta.com/git/?p=linux-vyatta.git;a=commitdiff;h=2b2758facdb3f3587488b23d3100581b867715f3
http://suva.vyatta.com/git/?p=linux-vyatta.git;a=commitdiff;h=ecbc25f3fe237ca598f676098890e69efcd27fbb
_______________________________________________
svn mailing list
[email protected]
http://mailman.vyatta.com/mailman/listinfo/svn