Release linux (4.3.3-1).

-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIVAwUAVnCT2+e/yOyVhhEJAQr+qw/9E5dEKfpAfOywx9lA0eQKKBx2yt2IkdGc
 0k9UFJlJc5xpOwEH03WOlU3XktlrwNzaT6U0Qvu6MW4Y77G60fDbAB/J+1jlYatK
 02CEUmBgrD5M6Cm/9J085mglIEt+5tq0RIZwAWx7iki53H/y1KQ6uski3oZwcguu
 Go5KP744Osen5cyJKgT+vV/VGHc+BJEMcNFNI1nlh71owTQKT2ZsLx8fd3ZIdGsB
 8rTC3pIsE8YjTcaRhKcJ1t6a19fX/2fD7KsfZTo8YdfLReg29CZ6TlQF8clzh8yH
 37RWnEEYZT3vDbLVFOr4RVj0/b5skJQmuC7Bs40dywPyjEK/OQHMUWdcw4ZAxsq1
 kNL9DhShF4G+HW58VOCRZSMO+R4R2Cl7JIz4bjhhPIOka9X/vn0yk/QgR6z16g0J
 DHc2zx9+OHlUgk89KpCtDYdzHth7uQAmg6WIJemVU1Mt4jdaHKoEtAI4iNkEjdby
 1LNnmYjukIixpTtb/NJGtyQPWSOOHnRQa7Cq36SngZoT4Gowb5hbDI9v+IrSQZUj
 ruEMqMl4Bcq3/R1HKdqcs0FK+obKceaHSoLH+ludH0U7UAjh3dqCotxHkX4DT+ws
 0CJAM1PIiiXG6n+TQve/wepG/Fv2yuOJg1BEo32Qjy5RtzhZf4vgZEYKJFrCGxR3
 oBYzz+yPcvg=
 =AlwC
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.3.3-1'

Drop the ABI reference and ignored symbols.

Drop most of the patches, as they're already upstream.
This commit is contained in:
Ben Hutchings 2015-12-16 17:15:08 +00:00
commit 70157abb7d
4 changed files with 167 additions and 0 deletions

82
debian/changelog vendored
View File

@ -21,6 +21,88 @@ linux (4.4~rc4-1~exp1) experimental; urgency=medium
-- Ben Hutchings <ben@decadent.org.uk> Sun, 13 Dec 2015 16:25:45 +0000
linux (4.3.3-1) unstable; urgency=medium
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.2
- X.509: Fix the time validation [ver #2]
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- r8169: fix kasan reported skb use-after-free. (regression in 4.3)
- af-unix: fix use-after-free with concurrent readers while splicing
(regression in 4.2)
- af_unix: don't append consumed skbs to sk_receive_queue
(regression in 4.2)
- af_unix: take receive queue lock while appending new skb
(regression in 4.2)
- af-unix: passcred support for sendpage (regression in 4.2)
- ipv6: Avoid creating RTF_CACHE from a rt that is not managed by fib6 tree
(regression in 4.2)
- ipv6: Check expire on DST_NOCACHE route
- ipv6: Check rt->dst.from for the DST_NOCACHE route (regression in 4.3)
- Revert "ipv6: ndisc: inherit metadata dst when creating ndisc requests"
(regression in 4.3)
- packet: only allow extra vlan len on ethernet devices
- packet: infer protocol from ethernet header if unset
- packet: fix tpacket_snd max frame len
- sctp: translate host order to network order when setting a hmacid
- net/mlx5e: Added self loopback prevention (regression in 4.3)
- net/mlx4_core: Fix sleeping while holding spinlock at rem_slave_counters
(regression in 4.2)
- ip_tunnel: disable preemption when updating per-cpu tstats
- net/ip6_tunnel: fix dst leak (regression in 4.3)
- tcp: disable Fast Open on timeouts after handshake
- tcp: fix potential huge kmalloc() calls in TCP_REPAIR
- tcp: initialize tp->copied_seq in case of cross SYN connection
- net, scm: fix PaX detected msg_controllen overflow in scm_detach_fds
- net: ipmr: fix static mfc/dev leaks on table destruction
- net: ip6mr: fix static mfc/dev leaks on table destruction
- vrf: fix double free and memory corruption on register_netdevice failure
- tipc: fix error handling of expanding buffer headroom (regression in 4.3)
- ipv6: distinguish frag queues by device for multicast and link-local
packets
- bpf, array: fix heap out-of-bounds access when updating elements
- ipv6: add complete rcu protection around np->opt
- net/neighbour: fix crash at dumping device-agnostic proxy entries
- ipv6: sctp: implement sctp_v6_destroy_sock()
- openvswitch: fix hangup on vxlan/gre/geneve device deletion
- net_sched: fix qdisc_tree_decrease_qlen() races
- btrfs: fix resending received snapshot with parent (regression in 4.2)
- Btrfs: fix file corruption and data loss after cloning inline extents
- Btrfs: fix regression when running delayed references (regression in 4.2)
- Btrfs: fix race leading to incorrect item deletion when dropping extents
- Btrfs: fix race leading to BUG_ON when running delalloc for nodatacow
- Btrfs: fix race when listing an inode's xattrs
- rbd: don't put snap_context twice in rbd_queue_workfn()
- ext4 crypto: fix memory leak in ext4_bio_write_page()
- ext4 crypto: fix bugs in ext4_encrypted_zeroout()
- ext4: fix potential use after free in __ext4_journal_stop
(regression in 4.2)
- ext4, jbd2: ensure entering into panic after recording an error in
superblock
- nfsd: serialize state seqid morphing operations
- nfsd: eliminate sending duplicate and repeated delegations
- nfs4: start callback_ident at idr 1
- nfs4: resend LAYOUTGET when there is a race that changes the seqid
- nfs: if we have no valid attrs, then don't declare the attribute cache
valid
- ocfs2: fix umask ignored issue
- block: fix segment split (regression in 4.3)
- ceph: fix message length computation
- Btrfs: fix regression running delayed references when using qgroups
(regression in 4.2)
[ Ben Hutchings ]
* net: add validation for the socket syscall protocol argument (CVE-2015-8543)
* [armel/kirkwood] udeb: Override inclusion of gpio_keys in input-modules
(fixes FTBFS)
* vrf: Fix broken backport of "vrf: fix double free and memory corruption on
register_netdevice failure" in 4.3.3
* net: Ignore ABI changes due to "ipv6: add complete rcu protection around
np->opt", which don't appear to affect out-of-tree modules
* tipc: Fix kfree_skb() of uninitialised pointer (regression in 4.3.3)
-- Ben Hutchings <ben@decadent.org.uk> Tue, 15 Dec 2015 21:25:26 +0000
linux (4.3.1-1) unstable; urgency=medium
* New upstream stable update:

View File

@ -1 +1,3 @@
#include <input-modules>
# Moved to event-modules for use in network-console builds
gpio_keys -

View File

@ -0,0 +1,82 @@
From: Hannes Frederic Sowa <hannes@stressinduktion.org>
Subject: net: add validation for the socket syscall protocol argument
Date: Mon, 14 Dec 2015 17:17:49 +0100
Origin: http://article.gmane.org/gmane.linux.network/391482
郭永刚 reported that one could simply crash the kernel as root by
using a simple program:
int socket_fd;
struct sockaddr_in addr;
addr.sin_port = 0;
addr.sin_addr.s_addr = INADDR_ANY;
addr.sin_family = 10;
socket_fd = socket(10,3,0x40000000);
connect(socket_fd , &addr,16);
AF_INET, AF_INET6 sockets actually only support 8-bit protocol
identifiers. inet_sock's skc_protocol field thus is sized accordingly,
thus larger protocol identifiers simply cut off the higher bits and
store a zero in the protocol fields.
This could lead to e.g. NULL function pointer because as a result of
the cut off inet_num is zero and we call down to inet_autobind, which
is NULL for raw sockets.
kernel: Call Trace:
kernel: [<ffffffff816db90e>] ? inet_autobind+0x2e/0x70
kernel: [<ffffffff816db9a4>] inet_dgram_connect+0x54/0x80
kernel: [<ffffffff81645069>] SYSC_connect+0xd9/0x110
kernel: [<ffffffff810ac51b>] ? ptrace_notify+0x5b/0x80
kernel: [<ffffffff810236d8>] ? syscall_trace_enter_phase2+0x108/0x200
kernel: [<ffffffff81645e0e>] SyS_connect+0xe/0x10
kernel: [<ffffffff81779515>] tracesys_phase2+0x84/0x89
I found no particular commit which introduced this problem.
CVE: CVE-2015-8543
Reported-by: 郭永刚 <guoyonggang@360.cn>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
---
net/ipv4/af_inet.c | 3 +++
net/ipv6/af_inet6.c | 3 +++
net/socket.c | 3 +++
3 files changed, 9 insertions(+)
--- a/net/ipv4/af_inet.c
+++ b/net/ipv4/af_inet.c
@@ -261,6 +261,9 @@ static int inet_create(struct net *net,
int try_loading_module = 0;
int err;
+ if (protocol >= IPPROTO_MAX)
+ return -EINVAL;
+
sock->state = SS_UNCONNECTED;
/* Look for the requested type/protocol pair. */
--- a/net/ipv6/af_inet6.c
+++ b/net/ipv6/af_inet6.c
@@ -109,6 +109,9 @@ static int inet6_create(struct net *net,
int try_loading_module = 0;
int err;
+ if (protocol >= IPPROTO_MAX)
+ return -EINVAL;
+
/* Look for the requested type/protocol pair. */
lookup_protocol:
err = -ESOCKTNOSUPPORT;
--- a/net/socket.c
+++ b/net/socket.c
@@ -1105,6 +1105,9 @@ int __sock_create(struct net *net, int f
return -EAFNOSUPPORT;
if (type < 0 || type >= SOCK_MAX)
return -EINVAL;
+ /* upper bound should be tested by per-protocol .create callbacks */
+ if (protocol < 0)
+ return -EINVAL;
/* Compatibility.

View File

@ -67,3 +67,4 @@ features/all/grsecurity/grkernsec_perf_harden.patch
bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch
bugfix/all/media-usbvision-fix-crash-on-detecting-device-with-i.patch
bugfix/x86/drm-i915-shut-up-gen8-sde-irq-dmesg-noise.patch
bugfix/all/net-add-validation-for-the-socket-syscall-protocol.patch