SOURCES (LINUX_2_6_16): grsecurity-2.1.9-2.6.16.14.patch - updated...
adamg
adamg at pld-linux.org
Mon Dec 18 10:04:05 CET 2006
Author: adamg Date: Mon Dec 18 09:04:05 2006 GMT
Module: SOURCES Tag: LINUX_2_6_16
---- Log message:
- updated to 2.6.16.36
---- Files affected:
SOURCES:
grsecurity-2.1.9-2.6.16.14.patch (1.1.2.2.2.3 -> 1.1.2.2.2.4)
---- Diffs:
================================================================
Index: SOURCES/grsecurity-2.1.9-2.6.16.14.patch
diff -u SOURCES/grsecurity-2.1.9-2.6.16.14.patch:1.1.2.2.2.3 SOURCES/grsecurity-2.1.9-2.6.16.14.patch:1.1.2.2.2.4
--- SOURCES/grsecurity-2.1.9-2.6.16.14.patch:1.1.2.2.2.3 Fri Nov 17 11:42:29 2006
+++ SOURCES/grsecurity-2.1.9-2.6.16.14.patch Mon Dec 18 10:03:59 2006
@@ -6628,7 +6628,7 @@
- * <= p_memsize so it is only necessary to check p_memsz.
- */
- k = load_addr + eppnt->p_vaddr;
-- if (k > TASK_SIZE || eppnt->p_filesz > eppnt->p_memsz ||
+- if (BAD_ADDR(k) || eppnt->p_filesz > eppnt->p_memsz ||
- eppnt->p_memsz > TASK_SIZE || TASK_SIZE - eppnt->p_memsz < k) {
- error = -ENOMEM;
+ if (eppnt->p_type != PT_LOAD)
@@ -7030,10 +7030,10 @@
* allowed task size. Note that p_filesz must always be
* <= p_memsz so it is only necessary to check p_memsz.
*/
-- if (k > TASK_SIZE || elf_ppnt->p_filesz > elf_ppnt->p_memsz ||
+- if (BAD_ADDR(k) || elf_ppnt->p_filesz > elf_ppnt->p_memsz ||
- elf_ppnt->p_memsz > TASK_SIZE ||
- TASK_SIZE - elf_ppnt->p_memsz < k) {
-+ if (k > task_size || elf_ppnt->p_filesz > elf_ppnt->p_memsz ||
++ if (BAD_ADDR(k) || elf_ppnt->p_filesz > elf_ppnt->p_memsz ||
+ elf_ppnt->p_memsz > task_size ||
+ task_size - elf_ppnt->p_memsz < k) {
/* set_brk can never work. Avoid overflows. */
@@ -7052,15 +7052,6 @@
/* Calling set_brk effectively mmaps the pages that we need
* for the bss and break sections. We must do this before
* mapping in the interpreter, to make sure it doesn't wind
-@@ -929,7 +1220,7 @@ static int load_elf_binary(struct linux_
- printk(KERN_ERR "Unable to load interpreter %.128s\n",
- elf_interpreter);
- force_sig(SIGSEGV, current);
-- retval = -ENOEXEC; /* Nobody gets to see this, but.. */
-+ retval = elf_entry; /* Nobody gets to see this, but.. */
- goto out_free_dentry;
- }
- reloc_func_desc = interp_load_addr;
@@ -1153,7 +1444,7 @@ static int dump_seek(struct file *file,
*
* I think we should skip something. But I am not sure how. H.J.
================================================================
---- CVS-web:
http://cvs.pld-linux.org/SOURCES/grsecurity-2.1.9-2.6.16.14.patch?r1=1.1.2.2.2.3&r2=1.1.2.2.2.4&f=u
More information about the pld-cvs-commit
mailing list