Hello community,

here is the log from the commit of package libcgroup1 for openSUSE:11.4
checked in at Mon Mar 14 15:43:24 CET 2011.



--------
--- old-versions/11.4/all/libcgroup1/libcgroup1.changes 2010-07-05 
22:18:17.000000000 +0200
+++ 11.4/libcgroup1/libcgroup1.changes  2011-03-03 14:27:51.000000000 +0100
@@ -1,0 +2,6 @@
+Mon Feb 28 18:25:33 CET 2011 - jsl...@suse.de
+
+- verify the sender of netlink messages (bnc#675048, CVE-2011-1022)
+- fix buf overflow (bnc#675506, CVE-2011-1006)
+
+-------------------------------------------------------------------

Package does not exist at destination yet. Using Fallback 
old-versions/11.4/all/libcgroup1
Destination is old-versions/11.4/UPDATES/all/libcgroup1
calling whatdependson for 11.4-i586


New:
----
  cgrulesengd-deny-message-forging.patch
  libcgroup-CVE-2011-1006.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ libcgroup1.spec ++++++
--- /var/tmp/diff_new_pack.LyK1CQ/_old  2011-03-14 15:43:00.000000000 +0100
+++ /var/tmp/diff_new_pack.LyK1CQ/_new  2011-03-14 15:43:00.000000000 +0100
@@ -1,7 +1,7 @@
 #
-# spec file for package libcgroup1 (Version 0.36.2)
+# spec file for package libcgroup1
 #
-# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2011 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -20,7 +20,7 @@
 
 Name:           libcgroup1
 Version:        0.36.2
-Release:        2
+Release:        6.<RELEASE2>
 License:        LGPLv2.1
 Group:          System/Management
 AutoReqProv:    on
@@ -31,6 +31,8 @@
 Source2:        initd_cgred
 Source3:        sysconfig.cgred
 Source99:       baselibs.conf
+Patch0:         cgrulesengd-deny-message-forging.patch
+Patch1:         libcgroup-CVE-2011-1006.patch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 BuildRequires:  bison flex gcc-c++ pam-devel pkg-config
 Requires:       insserv pam
@@ -69,6 +71,8 @@
 
 %prep
 %setup -n libcgroup-%{version}
+%patch0 -p1
+%patch1 -p1
 
 %build
 %configure --enable-pam-module-dir=/%{_lib}/security

++++++ cgrulesengd-deny-message-forging.patch ++++++
>From 0a59ea5e0b2ce466bfd35c9e700094bf09a0310d Mon Sep 17 00:00:00 2001
From: Nelson Elhage <nelh...@ksplice.com>
Date: Thu, 17 Feb 2011 20:55:12 -0500
Subject: cgrulesengd: Ignore netlink messages that don't come from the kernel.
References: bnc#675048, CVE-2011-1022

recvfrom() returns the address, it doesn't filter the packet based on the
sender. We need to explicitly check the received address after the call happens.

Signed-off-by: Nelson Elhage <nelh...@ksplice.com>
Signed-off-by: Jan Safranek <jsafr...@redhat.com>
Signed-off-by: Jiri Slaby <jsl...@suse.cz>
---
 src/daemon/cgrulesengd.c |   11 ++++-------
 1 files changed, 4 insertions(+), 7 deletions(-)

diff --git a/src/daemon/cgrulesengd.c b/src/daemon/cgrulesengd.c
index 10fd2cd..5a965fd 100644
--- a/src/daemon/cgrulesengd.c
+++ b/src/daemon/cgrulesengd.c
@@ -503,17 +503,10 @@ static int cgre_receive_netlink_msg(int sk_nl)
        struct sockaddr_nl from_nla;
        socklen_t from_nla_len;
        struct nlmsghdr *nlh;
-       struct sockaddr_nl kern_nla;
        struct cn_msg *cn_hdr;
 
-       kern_nla.nl_family = AF_NETLINK;
-       kern_nla.nl_groups = CN_IDX_PROC;
-       kern_nla.nl_pid = 1;
-       kern_nla.nl_pad = 0;
-
        memset(buff, 0, sizeof(buff));
        from_nla_len = sizeof(from_nla);
-       memcpy(&from_nla, &kern_nla, sizeof(from_nla));
        recv_len = recvfrom(sk_nl, buff, sizeof(buff), 0,
                (struct sockaddr *)&from_nla, &from_nla_len);
        if (recv_len == ENOBUFS) {
@@ -523,6 +516,10 @@ static int cgre_receive_netlink_msg(int sk_nl)
        if (recv_len < 1)
                return 0;
 
+       if (from_nla.nl_groups != CN_IDX_PROC
+           || from_nla.nl_pid != 0)
+               return 0;
+
        nlh = (struct nlmsghdr *)buff;
        while (NLMSG_OK(nlh, recv_len)) {
                cn_hdr = NLMSG_DATA(nlh);
-- 
1.7.4.1

++++++ libcgroup-CVE-2011-1006.patch ++++++
>From 5ae8aea1ecd60c439121d3329d8eaabf13d292c1 Mon Sep 17 00:00:00 2001
From: Jan Safranek <jsafr...@redhat.com>
Date: Tue, 1 Mar 2011 13:11:35 +0100
Subject: Fix buffer overflow when processing list of controllers from command 
line (CVE-2011-1006).
Git-commit: 5ae8aea1ecd60c439121d3329d8eaabf13d292c1
Patch-mainline: yes
References: bnc#675506, CVE-2011-1006

Thanks to Nelson Elhage for reporting this issue.

Signed-off-by: Jan Safranek <jsafr...@redhat.com>
Signed-off-by: Jiri Slaby <jsl...@suse.cz>
---
 src/tools/tools-common.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/src/tools/tools-common.c b/src/tools/tools-common.c
index 4beffcd..7d633be 100644
--- a/src/tools/tools-common.c
+++ b/src/tools/tools-common.c
@@ -79,7 +79,7 @@ int parse_cgroup_spec(struct cgroup_group_spec **cdptr, char 
*optarg,
                        }
                }
                j++;
-       } while (temp);
+       } while (temp && j<CG_CONTROLLER_MAX-1);
 
        /* Store path to the cgroup */
        strncpy(cdptr[i]->path, pathptr, FILENAME_MAX);
-- 
1.7.4.1


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



Remember to have fun...

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to