[Trusty] [CVE-2014-0181] [PATCH 0/6] Fix CVE-2014-0181 on trusty.

Maarten Lankhorst maarten.lankhorst at canonical.com
Thu Jul 3 12:53:21 UTC 2014


I also added "net: Fix permission check in netlink_connect", just in case.
Without it a hunk fails to apply, and it matches the 1.15 behavior so I felt
it was useful to backport too, given the nature of the CVE.

Eric W. Biederman (5):
  netlink: Rename netlink_capable netlink_allowed
  net: Move the permission check in sock_diag_put_filterinfo to
    packet_diag_dump
  net: Add variants of capable for use on on sockets
  net: Add variants of capable for use on netlink messages
  net: Use netlink_ns_capable to verify the permisions of netlink
    messages

Mike Pecovnik (1):
  net: Fix permission check in netlink_connect()

 crypto/crypto_user.c            |  2 +-
 drivers/connector/cn_proc.c     |  2 +-
 drivers/scsi/scsi_netlink.c     |  2 +-
 include/linux/netlink.h         |  7 ++++
 include/linux/sock_diag.h       |  2 +-
 include/net/sock.h              |  5 +++
 kernel/audit.c                  |  4 +--
 net/can/gw.c                    |  4 +--
 net/core/rtnetlink.c            | 20 ++++++-----
 net/core/sock.c                 | 49 ++++++++++++++++++++++++++
 net/core/sock_diag.c            |  4 +--
 net/dcb/dcbnl.c                 |  2 +-
 net/decnet/dn_dev.c             |  4 +--
 net/decnet/dn_fib.c             |  4 +--
 net/decnet/netfilter/dn_rtmsg.c |  2 +-
 net/netfilter/nfnetlink.c       |  2 +-
 net/netlink/af_netlink.c        | 77 +++++++++++++++++++++++++++++++++++++----
 net/netlink/genetlink.c         |  2 +-
 net/packet/diag.c               |  7 +++-
 net/phonet/pn_netlink.c         |  8 ++---
 net/sched/act_api.c             |  2 +-
 net/sched/cls_api.c             |  2 +-
 net/sched/sch_api.c             |  6 ++--
 net/tipc/netlink.c              |  2 +-
 net/xfrm/xfrm_user.c            |  2 +-
 25 files changed, 178 insertions(+), 45 deletions(-)

-- 
2.0.0






More information about the kernel-team mailing list