From: Jan Rękorajski Date: Sun, 5 Jun 2016 19:19:42 +0000 (+0200) Subject: - 4.4.12 X-Git-Tag: auto/th/kernel-4.4-4.4.12-1 X-Git-Url: http://git.pld-linux.org/gitweb.cgi?p=packages%2Fkernel.git;a=commitdiff_plain;h=7ed9d69476af7b44f15751fcdbe171d66b3a94b7 - 4.4.12 --- diff --git a/kernel-small_fixes.patch b/kernel-small_fixes.patch index d0f2c8b5..18708652 100644 --- a/kernel-small_fixes.patch +++ b/kernel-small_fixes.patch @@ -235,49 +235,3 @@ _______________________________________________ xfs mailing list xfs@oss.sgi.com http://oss.sgi.com/mailman/listinfo/xfs -From 8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 Mon Sep 17 00:00:00 2001 -From: Jann Horn -Date: Tue, 26 Apr 2016 22:26:26 +0200 -Subject: bpf: fix double-fdput in replace_map_fd_with_map_ptr() - -When bpf(BPF_PROG_LOAD, ...) was invoked with a BPF program whose bytecode -references a non-map file descriptor as a map file descriptor, the error -handling code called fdput() twice instead of once (in __bpf_map_get() and -in replace_map_fd_with_map_ptr()). If the file descriptor table of the -current task is shared, this causes f_count to be decremented too much, -allowing the struct file to be freed while it is still in use -(use-after-free). This can be exploited to gain root privileges by an -unprivileged user. - -This bug was introduced in -commit 0246e64d9a5f ("bpf: handle pseudo BPF_LD_IMM64 insn"), but is only -exploitable since -commit 1be7f75d1668 ("bpf: enable non-root eBPF programs") because -previously, CAP_SYS_ADMIN was required to reach the vulnerable code. - -(posted publicly according to request by maintainer) - -Signed-off-by: Jann Horn -Signed-off-by: Linus Torvalds -Acked-by: Alexei Starovoitov -Acked-by: Daniel Borkmann -Signed-off-by: David S. Miller ---- - kernel/bpf/verifier.c | 1 - - 1 file changed, 1 deletion(-) - -diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c -index 618ef77..db2574e 100644 ---- a/kernel/bpf/verifier.c -+++ b/kernel/bpf/verifier.c -@@ -2030,7 +2030,6 @@ static int replace_map_fd_with_map_ptr(struct verifier_env *env) - if (IS_ERR(map)) { - verbose("fd %d is not pointing to valid bpf_map\n", - insn->imm); -- fdput(f); - return PTR_ERR(map); - } - --- -cgit v0.12 - diff --git a/kernel.spec b/kernel.spec index 78dbfebc..89afec79 100644 --- a/kernel.spec +++ b/kernel.spec @@ -71,7 +71,7 @@ %define rel 1 %define basever 4.4 -%define postver .10 +%define postver .12 # define this to '-%{basever}' for longterm branch %define versuffix -%{basever} @@ -120,7 +120,7 @@ Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{basever}.tar.xz # Source0-md5: 9a78fa2eb6c68ca5a40ed5af08142599 %if "%{postver}" != ".0" Patch0: http://www.kernel.org/pub/linux/kernel/v4.x/patch-%{version}.xz -# Patch0-md5: 1b9a296c0d0b778e8173299618f2d84f +# Patch0-md5: 80d71a51152029a3f2fe99ba94548009 %endif Source1: kernel.sysconfig