<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel, branch linux-2.6.13.y</title>
<subtitle>Hosts the 0x221E linux distro kernel.</subtitle>
<id>https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-2.6.13.y</id>
<link rel='self' href='https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-2.6.13.y'/>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/'/>
<updated>2005-12-15T18:38:27Z</updated>
<entry>
<title>Linux 2.6.13.5</title>
<updated>2005-12-15T18:38:27Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2005-12-15T18:38:27Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=816e9c6c226227c4862b2067aace0f450cc92635'/>
<id>urn:sha1:816e9c6c226227c4862b2067aace0f450cc92635</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[PATCH] Fix compile error in irq.c</title>
<updated>2005-12-15T18:33:18Z</updated>
<author>
<name>Sven Hartge</name>
<email>hartge@ds9.argh.org</email>
</author>
<published>2005-10-09T04:14:34Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=f4e4e0fa2b42a7701e833fd04cac70ff0d28fa9f'/>
<id>urn:sha1:f4e4e0fa2b42a7701e833fd04cac70ff0d28fa9f</id>
<content type='text'>
irq.c is missing the inclusion of asm/io.h, which causes
readb() and writeb() the be undefined.

Signed-off-by: Sven Hartge &lt;hartge@ds9.argh.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] CVE-2005-2709 sysctl unregistration oops</title>
<updated>2005-12-15T18:33:17Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2005-11-08T15:03:46Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=e545fd941928c6ff87571e6742f81d7659c0578d'/>
<id>urn:sha1:e545fd941928c6ff87571e6742f81d7659c0578d</id>
<content type='text'>
You could open the /proc/sys/net/ipv4/conf/&lt;if&gt;/&lt;whatever&gt; file, then
wait for interface to go away, try to grab as much memory as possible in
hope to hit the (kfreed) ctl_table.  Then fill it with pointers to your
function. Then do read from file you've opened and if you are lucky,
you'll get it called as -&gt;proc_handler() in kernel mode.

So this is at least an Oops and possibly more.  It does depend on an
interface going away though, so less of a security risk than it would
otherwise be.

Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] br: fix race on bridge del if</title>
<updated>2005-12-15T18:33:17Z</updated>
<author>
<name>Stephen Hemminger</name>
<email>shemminger@osdl.org</email>
</author>
<published>2005-10-11T20:33:28Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=20b233a95e9d0a146a1c160d0874545323336a50'/>
<id>urn:sha1:20b233a95e9d0a146a1c160d0874545323336a50</id>
<content type='text'>
This fixes the RCU race on bridge delete interface.  Basically,
the network device has to be detached from the bridge in the first
step (pre-RCU), rather than later. At that point, no more bridge traffic
will come in, and the other code will not think that network device
is part of a bridge.

This should also fix the XEN test problems. If there is another
2.6.13-stable, add it as well.

Signed-off-by: Stephen Hemminger &lt;shemminger@osdl.org&gt;
Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>Linux 2.6.13.4</title>
<updated>2005-10-10T18:54:29Z</updated>
<author>
<name>Greg KH</name>
<email>gregkh@suse.de</email>
</author>
<published>2005-10-10T18:54:29Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=21c3ed9b226c09e4401d299b4a83acfd140f6e8d'/>
<id>urn:sha1:21c3ed9b226c09e4401d299b4a83acfd140f6e8d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[PATCH] key: plug request_key_auth memleak (CAN-2005-3119)</title>
<updated>2005-10-10T18:50:55Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-10-07T23:43:55Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=db5356da707a5e8414c6ea9e5d50ce3ef884afce'/>
<id>urn:sha1:db5356da707a5e8414c6ea9e5d50ce3ef884afce</id>
<content type='text'>
Plug request_key_auth memleak.  This can be triggered by unprivileged
users, so is local DoS.

Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] Fix drm 'debug' sysfs permissions</title>
<updated>2005-10-10T18:50:55Z</updated>
<author>
<name>Dave Jones</name>
<email>davej@redhat.com</email>
</author>
<published>2005-10-07T23:43:52Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=b17681a236a4f0faf237241dea833fc6ada997c0'/>
<id>urn:sha1:b17681a236a4f0faf237241dea833fc6ada997c0</id>
<content type='text'>
Please consider for next 2.6.13, it is a minor security issue allowing
users to turn on drm debugging when they shouldn't...

This fell through the cracks. Until Josh pointed me at
http://bugs.gentoo.org/show_bug.cgi?id=107893

Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL</title>
<updated>2005-10-10T18:50:54Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@osdl.org</email>
</author>
<published>2005-10-07T23:43:54Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=5be2ff20d0750801919c784e10427ee98d6c5639'/>
<id>urn:sha1:5be2ff20d0750801919c784e10427ee98d6c5639</id>
<content type='text'>
Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL

The nameidata "last.name" is always allocated with "__getname()", and
should always be free'd with "__putname()".

Using "putname()" without the underscores will leak memory, because the
allocation will have been hidden from the AUDITSYSCALL code.

Arguably the real bug is that the AUDITSYSCALL code is really broken,
but in the meantime this fixes the problem people see.

Reported by Robert Derr, patch by Rick Lindsley.

Acked-by: Al Viro &lt;viro@ftp.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] Fix userland FPU state corruption.</title>
<updated>2005-10-10T18:50:54Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2005-10-07T23:43:53Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=d7c6ec0fa0de0b99b3bb66cc0b63e1331ae76984'/>
<id>urn:sha1:d7c6ec0fa0de0b99b3bb66cc0b63e1331ae76984</id>
<content type='text'>
We need to use stricter memory barriers around the block
load and store instructions we use to save and restore the
FPU register file.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] BIC coding bug in Linux 2.6.13</title>
<updated>2005-10-10T18:50:54Z</updated>
<author>
<name>Stephen Hemminger</name>
<email>shemminger@osdl.org</email>
</author>
<published>2005-10-07T23:43:51Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=1aa561c7dd019a6723deba2e0d408638e9172f01'/>
<id>urn:sha1:1aa561c7dd019a6723deba2e0d408638e9172f01</id>
<content type='text'>
Please consider this change for 2.6.13-stable   Since BIC is
the default congestion control algorithm, this fix is quite
important.

Missing parenthesis in causes BIC to be slow in increasing congestion
window.

Spotted by Injong Rhee.

Signed-off-by: Stephen Hemminger &lt;shemminger@osdl.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
</feed>
