summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJosh Boyer <jwboyer@fedoraproject.org>2014-03-12 09:23:47 -0400
committerJosh Boyer <jwboyer@fedoraproject.org>2014-03-12 09:23:47 -0400
commit5210c91e6990f0e90864aff3c51c9928775de100 (patch)
tree223ae15997a527b5d9cf3733340e6d19124df4d2
parent064542de7821bbc57f796047ef067000d016a4fb (diff)
downloadkernel-5210c91e6990f0e90864aff3c51c9928775de100.tar.gz
kernel-5210c91e6990f0e90864aff3c51c9928775de100.tar.xz
kernel-5210c91e6990f0e90864aff3c51c9928775de100.zip
Linux v3.14-rc6-26-g33807f4
-rw-r--r--cifs-mask-off-top-byte-in-get_rfc1002_length.patch88
-rw-r--r--cifs-sanity-check-length-of-data-to-send-before-sending.patch129
-rw-r--r--kernel.spec17
-rw-r--r--sources2
4 files changed, 5 insertions, 231 deletions
diff --git a/cifs-mask-off-top-byte-in-get_rfc1002_length.patch b/cifs-mask-off-top-byte-in-get_rfc1002_length.patch
deleted file mode 100644
index 572b0b320..000000000
--- a/cifs-mask-off-top-byte-in-get_rfc1002_length.patch
+++ /dev/null
@@ -1,88 +0,0 @@
-Path: news.gmane.org!not-for-mail
-From: Jeff Layton <jlayton-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
-Newsgroups: gmane.linux.kernel.cifs
-Subject: [PATCH] cifs: mask off top byte in get_rfc1002_length()
-Date: Tue, 25 Feb 2014 05:27:17 -0800
-Lines: 31
-Approved: news@gmane.org
-Message-ID: <1393334837-6480-1-git-send-email-jlayton@redhat.com>
-NNTP-Posting-Host: plane.gmane.org
-X-Trace: ger.gmane.org 1393334843 15695 80.91.229.3 (25 Feb 2014 13:27:23 GMT)
-X-Complaints-To: usenet@ger.gmane.org
-NNTP-Posting-Date: Tue, 25 Feb 2014 13:27:23 +0000 (UTC)
-Cc: klaus-jjkdzbv0JQgAvxtiuMwx3w@public.gmane.org, sprabhu-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org, linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-To: smfrench-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
-Original-X-From: linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org Tue Feb 25 14:27:30 2014
-Return-path: <linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-Envelope-to: glkc-linux-cifs-wOFGN7rlS/M9smdsby/KFg@public.gmane.org
-Original-Received: from vger.kernel.org ([209.132.180.67])
- by plane.gmane.org with esmtp (Exim 4.69)
- (envelope-from <linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>)
- id 1WII2h-0005Fo-GS
- for glkc-linux-cifs-wOFGN7rlS/M9smdsby/KFg@public.gmane.org; Tue, 25 Feb 2014 14:27:27 +0100
-Original-Received: (majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org) by vger.kernel.org via listexpand
- id S1752439AbaBYN10 (ORCPT <rfc822;glkc-linux-cifs@m.gmane.org>);
- Tue, 25 Feb 2014 08:27:26 -0500
-Original-Received: from mail-pa0-f41.google.com ([209.85.220.41]:49339 "EHLO
- mail-pa0-f41.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org
- with ESMTP id S1752329AbaBYN10 (ORCPT
- <rfc822;linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>); Tue, 25 Feb 2014 08:27:26 -0500
-Original-Received: by mail-pa0-f41.google.com with SMTP id fa1so8081181pad.14
- for <linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>; Tue, 25 Feb 2014 05:27:25 -0800 (PST)
-X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
- d=1e100.net; s=20130820;
- h=x-gm-message-state:sender:from:to:cc:subject:date:message-id;
- bh=I4guc46K5w45idU9LGsBcibRE60G/EkhmnDXX8d4lFc=;
- b=YI5Ag6zKBzcWzALN9+g56fwi/XbV8N9i0JCfbhVRCEv9/JYNUHzVBZ+WO3Wqaf54U/
- qNNjrH1Io0LpiVTF5+ZuiDEee4Vt8QbMP7iD7rkxh4RZq9clRgum/wVTwV5l/SfIwud7
- HqGJlJ3jSGtTO4bhBuvX5mD4FrHw4RZJvaWzowzMvYH536b8nZu9typSL4G+KQEV34la
- 19S6ikv1BjtJ49PUS3Gf9xMsqwkJNrLVBauag3yqhztcTSnP5UrxuauSWX0c68R2Lt70
- hdx5HGMQ0P2wgG6+Qvs3tEl2+infCJkpOH5X7KSvN1pT9hxtt6iE5QGFh5dtUTKe7FlA
- /grg==
-X-Gm-Message-State: ALoCoQlVCE5L6UI8IEC9kyuJlrAWBVyYN/eaeZJVp0fm2f2fDE/042yEkI6q9uGoP1vHrftB4/7C
-X-Received: by 10.69.31.65 with SMTP id kk1mr6563795pbd.47.1393334845726;
- Tue, 25 Feb 2014 05:27:25 -0800 (PST)
-Original-Received: from corrin.poochiereds.net.cthon.org (64-71-23-226.static.wiline.com. [64.71.23.226])
- by mx.google.com with ESMTPSA id eb5sm143431078pad.22.2014.02.25.05.27.24
- for <multiple recipients>
- (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
- Tue, 25 Feb 2014 05:27:25 -0800 (PST)
-X-Mailer: git-send-email 1.8.5.3
-Original-Sender: linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-Precedence: bulk
-List-ID: <linux-cifs.vger.kernel.org>
-X-Mailing-List: linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-Xref: news.gmane.org gmane.linux.kernel.cifs:9419
-Archived-At: <http://permalink.gmane.org/gmane.linux.kernel.cifs/9419>
-
-The 32-bit rfc1002 header field consists of a type byte and then a
-24-bit length field, but get_rfc1002_length doesn't mask off the top
-byte.
-
-In most cases, it's not a problem since the RFC1002_SESSION_MESSAGE type
-is '\0', but when doing a RFC1002 session establishment, the type is
-non-zero and that throws off the returned length in smb_send_rqst.
-
-Reported-by: klaus-jjkdzbv0JQgAvxtiuMwx3w@public.gmane.org
-Tested-by: Sachin Prabhu <sprabhu-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
-Signed-off-by: Jeff Layton <jlayton-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
----
- fs/cifs/cifsglob.h | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
-index e7fe49e..45376a4 100644
---- a/fs/cifs/cifsglob.h
-+++ b/fs/cifs/cifsglob.h
-@@ -506,7 +506,7 @@ struct cifs_mnt_data {
- static inline unsigned int
- get_rfc1002_length(void *buf)
- {
-- return be32_to_cpu(*((__be32 *)buf));
-+ return be32_to_cpu(*((__be32 *)buf)) & 0xffffff;
- }
-
- static inline void
---
-1.8.5.3
-
diff --git a/cifs-sanity-check-length-of-data-to-send-before-sending.patch b/cifs-sanity-check-length-of-data-to-send-before-sending.patch
deleted file mode 100644
index b0f31156e..000000000
--- a/cifs-sanity-check-length-of-data-to-send-before-sending.patch
+++ /dev/null
@@ -1,129 +0,0 @@
-Path: news.gmane.org!not-for-mail
-From: Jeff Layton <jlayton-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
-Newsgroups: gmane.linux.kernel.cifs
-Subject: [PATCH] cifs: sanity check length of data to send before sending
-Date: Fri, 14 Feb 2014 07:21:00 -0500
-Lines: 72
-Approved: news@gmane.org
-Message-ID: <1392380460-6997-1-git-send-email-jlayton@redhat.com>
-NNTP-Posting-Host: plane.gmane.org
-X-Trace: ger.gmane.org 1392380460 7637 80.91.229.3 (14 Feb 2014 12:21:00 GMT)
-X-Complaints-To: usenet@ger.gmane.org
-NNTP-Posting-Date: Fri, 14 Feb 2014 12:21:00 +0000 (UTC)
-Cc: linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-To: smfrench-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
-Original-X-From: linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org Fri Feb 14 13:21:08 2014
-Return-path: <linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-Envelope-to: glkc-linux-cifs-wOFGN7rlS/M9smdsby/KFg@public.gmane.org
-Original-Received: from vger.kernel.org ([209.132.180.67])
- by plane.gmane.org with esmtp (Exim 4.69)
- (envelope-from <linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>)
- id 1WEHlT-0001gj-Pf
- for glkc-linux-cifs-wOFGN7rlS/M9smdsby/KFg@public.gmane.org; Fri, 14 Feb 2014 13:21:08 +0100
-Original-Received: (majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org) by vger.kernel.org via listexpand
- id S1751935AbaBNMVH (ORCPT <rfc822;glkc-linux-cifs@m.gmane.org>);
- Fri, 14 Feb 2014 07:21:07 -0500
-Original-Received: from mail-qc0-f170.google.com ([209.85.216.170]:60206 "EHLO
- mail-qc0-f170.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org
- with ESMTP id S1751288AbaBNMVG (ORCPT
- <rfc822;linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>); Fri, 14 Feb 2014 07:21:06 -0500
-Original-Received: by mail-qc0-f170.google.com with SMTP id e9so20306487qcy.29
- for <linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>; Fri, 14 Feb 2014 04:21:05 -0800 (PST)
-X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
- d=1e100.net; s=20130820;
- h=x-gm-message-state:sender:from:to:cc:subject:date:message-id;
- bh=8FvTfO9jKY+Fzw5nmoxw6PuPxfXM/khvtS/Hnxnu+to=;
- b=i7Gy5AwQiFX7hVMJJMjvAR61u2zO8E7tTAgE0SfPp25untipj/RTae8xcA+0vVrznY
- sZwOPATUyFmu2mXAKh5L0WutFNF3SQirPVgM5jaKlMZQT253YInioO1AwD00Jtio00LX
- wOt19I6v3umZfSqCBw1dyDiH66kX4xKaKqdQoY2+nEsicG4RJvp4PpaLhG454nfpVxfN
- HeskcNJ5RBvg17JpDvKX6THqbKWsHSHHqKKCROERxeTbs7HTgV9jTNSDeOuPr6Loiovi
- 9DBQwQwMmlC9NebDqR5xatva30WRhyCp/xyHNaoY+aVk8N6r5YlFphLmLRvmaZ0Ed2CH
- 17WA==
-X-Gm-Message-State: ALoCoQmHyaepi0IHvwKS024wRq/srAdGRdo0UGUynLggzf843S3Yj7dwW53RjNbTDG1Y4w+/mqOB
-X-Received: by 10.229.13.133 with SMTP id c5mr12315963qca.22.1392380465000;
- Fri, 14 Feb 2014 04:21:05 -0800 (PST)
-Original-Received: from tlielax.poochiereds.net ([2001:470:8:d63:3a60:77ff:fe93:a95d])
- by mx.google.com with ESMTPSA id u4sm15047497qai.21.2014.02.14.04.21.04
- for <multiple recipients>
- (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
- Fri, 14 Feb 2014 04:21:04 -0800 (PST)
-X-Mailer: git-send-email 1.8.5.3
-Original-Sender: linux-cifs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-Precedence: bulk
-List-ID: <linux-cifs.vger.kernel.org>
-X-Mailing-List: linux-cifs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-Xref: news.gmane.org gmane.linux.kernel.cifs:9402
-Archived-At: <http://permalink.gmane.org/gmane.linux.kernel.cifs/9402>
-
-We had a bug discovered recently where an upper layer function
-(cifs_iovec_write) could pass down a smb_rqst with an invalid amount of
-data in it. The length of the SMB frame would be correct, but the rqst
-struct would cause smb_send_rqst to send nearly 4GB of data.
-
-This should never be the case. Add some sanity checking to the beginning
-of smb_send_rqst that ensures that the amount of data we're going to
-send agrees with the length in the RFC1002 header. If it doesn't, WARN()
-and return -EIO to the upper layers.
-
-Signed-off-by: Jeff Layton <jlayton-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
----
- fs/cifs/transport.c | 29 +++++++++++++++++++++++++++++
- 1 file changed, 29 insertions(+)
-
-diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c
-index b37570952846..18cd5650a5fc 100644
---- a/fs/cifs/transport.c
-+++ b/fs/cifs/transport.c
-@@ -270,6 +270,26 @@ cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx,
- iov->iov_len = rqst->rq_pagesz;
- }
-
-+static unsigned long
-+rqst_len(struct smb_rqst *rqst)
-+{
-+ unsigned int i;
-+ struct kvec *iov = rqst->rq_iov;
-+ unsigned long buflen = 0;
-+
-+ /* total up iov array first */
-+ for (i = 0; i < rqst->rq_nvec; i++)
-+ buflen += iov[i].iov_len;
-+
-+ /* add in the page array if there is one */
-+ if (rqst->rq_npages) {
-+ buflen += rqst->rq_pagesz * (rqst->rq_npages - 1);
-+ buflen += rqst->rq_tailsz;
-+ }
-+
-+ return buflen;
-+}
-+
- static int
- smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
- {
-@@ -277,6 +297,7 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
- struct kvec *iov = rqst->rq_iov;
- int n_vec = rqst->rq_nvec;
- unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
-+ unsigned long send_length;
- unsigned int i;
- size_t total_len = 0, sent;
- struct socket *ssocket = server->ssocket;
-@@ -285,6 +306,14 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
- if (ssocket == NULL)
- return -ENOTSOCK;
-
-+ /* sanity check send length */
-+ send_length = rqst_len(rqst);
-+ if (send_length != smb_buf_length + 4) {
-+ WARN(1, "Send length mismatch(send_length=%lu smb_buf_length=%u)\n",
-+ send_length, smb_buf_length);
-+ return -EIO;
-+ }
-+
- cifs_dbg(FYI, "Sending smb: smb_len=%u\n", smb_buf_length);
- dump_smb(iov[0].iov_base, iov[0].iov_len);
-
---
-1.8.5.3
-
diff --git a/kernel.spec b/kernel.spec
index 5ac5c20a7..11c5f3735 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -61,7 +61,7 @@ Summary: The Linux kernel
# The rc snapshot level
%define rcrev 6
# The git snapshot level
-%define gitrev 1
+%define gitrev 2
# Set rpm version accordingly
%define rpmversion 3.%{upstream_sublevel}.0
%endif
@@ -631,12 +631,6 @@ Patch22000: weird-root-dentry-name-debug.patch
Patch25047: drm-radeon-Disable-writeback-by-default-on-ppc.patch
-#CVE-2014-0069 rhbz 1064253 1062578
-Patch25201: cifs-sanity-check-length-of-data-to-send-before-sending.patch
-
-#rhbz 1068862
-Patch25002: cifs-mask-off-top-byte-in-get_rfc1002_length.patch
-
#rhbz 1071998
Patch25034: bug-1071998.patch
@@ -1287,12 +1281,6 @@ ApplyPatch ath9k_rx_dma_stop_check.patch
ApplyPatch drm-radeon-Disable-writeback-by-default-on-ppc.patch
-#CVE-2014-0069 rhbz 1064253 1062578
-ApplyPatch cifs-sanity-check-length-of-data-to-send-before-sending.patch
-
-#rhbz 1068862
-ApplyPatch cifs-mask-off-top-byte-in-get_rfc1002_length.patch
-
#rhbz 1071998
ApplyPatch bug-1071998.patch
@@ -2084,6 +2072,9 @@ fi
# ||----w |
# || ||
%changelog
+* Wed Mar 12 2014 Josh Boyer <jwboyer@fedoraproject.org> - 3.14.0-0.rc6.git2.1
+- Linux v3.14-rc6-26-g33807f4
+
* Wed Mar 12 2014 Peter Robinson <pbrobinson@fedoraproject.org>
- Add some general missing ARM drivers (mostly sound)
- ARM config tweaks and cleanups
diff --git a/sources b/sources
index 6475296fb..322695ebf 100644
--- a/sources
+++ b/sources
@@ -1,4 +1,4 @@
0ecbaf65c00374eb4a826c2f9f37606f linux-3.13.tar.xz
732d1952898b28d5ccc264cad77b0619 perf-man-3.13.tar.gz
cb06761a64fd9328add06577943e6b37 patch-3.14-rc6.xz
-6d6c3fd42d7ac21414b9602b5ee7e8ae patch-3.14-rc6-git1.xz
+331ea9b7849ae258ddb718029472f91a patch-3.14-rc6-git2.xz