Fix CVE-2011-2918
The full upstream fix is a8b0ca17b80e92faab46ee7179ba9e99ccb61233, however that doesn't apply cleanly at all to 2.6.35.14. A smaller patch was sent to stable for 3.0.4, which is commit 462fee3af72df0de7b60b96c525ffe8baf4db0f0. That was the basis used for this patch.
This commit is contained in:
parent
b2fe2ed5a1
commit
398017defd
|
@ -876,6 +876,9 @@ Patch14054: cifs-fix-possible-memory-corruption-in-CIFSFindNext.patch
|
|||
# CVE-2011-1833
|
||||
Patch14055: Ecryptfs-Add-mount-option-to-check-uid-of-device-bei.patch
|
||||
|
||||
# CVE-2011-2918
|
||||
Patch14056: perf-Fix-software-event-overflow.patch
|
||||
|
||||
%endif
|
||||
|
||||
BuildRoot: %{_tmppath}/kernel-%{KVERREL}-root
|
||||
|
@ -1651,6 +1654,9 @@ ApplyPatch cifs-fix-possible-memory-corruption-in-CIFSFindNext.patch
|
|||
# CVE-2011-1833
|
||||
ApplyPatch Ecryptfs-Add-mount-option-to-check-uid-of-device-bei.patch
|
||||
|
||||
# CVE-2011-2918
|
||||
ApplyPatch perf-Fix-software-event-overflow.patch
|
||||
|
||||
# END OF PATCH APPLICATIONS
|
||||
|
||||
%endif
|
||||
|
@ -2237,6 +2243,9 @@ fi
|
|||
# and build.
|
||||
|
||||
%changelog
|
||||
* Fri Sep 16 2011 Josh Boyer <jwboyer@redhat.com>
|
||||
- CVE-2011-2918: perf: Fix software event overflow
|
||||
|
||||
* Thu Sep 15 2011 Josh Boyer <jwboyer@redhat.com>
|
||||
- CVE-2011-2723: gro: Only reset frag0 when skb can be pulled
|
||||
- CVE-2011-2928: befs: Validate length of long symbolic links
|
||||
|
|
|
@ -0,0 +1,40 @@
|
|||
From 68183a00aebc8b7b89975578cda38358bf6f93a1 Mon Sep 17 00:00:00 2001
|
||||
From: Peter Zijlstra <a.p.zijlstra@chello.nl>
|
||||
Date: Fri, 16 Sep 2011 09:13:29 -0400
|
||||
Subject: [PATCH] perf: Fix software event overflow
|
||||
|
||||
The below patch is for -stable only, upstream has a much larger patch
|
||||
that contains the below hunk in commit a8b0ca17b80e92faab46ee7179ba9e99ccb61233
|
||||
|
||||
Vince found that under certain circumstances software event overflows
|
||||
go wrong and deadlock. Avoid trying to delete a timer from the timer
|
||||
callback.
|
||||
|
||||
Reported-by: Vince Weaver <vweaver1@eecs.utk.edu>
|
||||
Signed-off-by: Peter Zijlstra <a.p.zijlstra@chello.nl>
|
||||
---
|
||||
kernel/perf_event.c | 8 ++------
|
||||
1 files changed, 2 insertions(+), 6 deletions(-)
|
||||
|
||||
diff --git a/kernel/perf_event.c b/kernel/perf_event.c
|
||||
index fa8123e..720b764 100644
|
||||
--- a/kernel/perf_event.c
|
||||
+++ b/kernel/perf_event.c
|
||||
@@ -3985,12 +3985,8 @@ static int __perf_event_overflow(struct perf_event *event, int nmi,
|
||||
if (events && atomic_dec_and_test(&event->event_limit)) {
|
||||
ret = 1;
|
||||
event->pending_kill = POLL_HUP;
|
||||
- if (nmi) {
|
||||
- event->pending_disable = 1;
|
||||
- perf_pending_queue(&event->pending,
|
||||
- perf_pending_event);
|
||||
- } else
|
||||
- perf_event_disable(event);
|
||||
+ event->pending_disable = 1;
|
||||
+ perf_pending_queue(&event->pending, perf_pending_event);
|
||||
}
|
||||
|
||||
if (event->overflow_handler)
|
||||
--
|
||||
1.7.6
|
||||
|
Loading…
Reference in New Issue