[Trusty] [CVE-2014-0181] [PATCH 0/6] Fix CVE-2014-0181 on trusty.
Maarten Lankhorst
maarten.lankhorst at canonical.com
Thu Jul 3 12:53:21 UTC 2014
I also added "net: Fix permission check in netlink_connect", just in case.
Without it a hunk fails to apply, and it matches the 1.15 behavior so I felt
it was useful to backport too, given the nature of the CVE.
Eric W. Biederman (5):
netlink: Rename netlink_capable netlink_allowed
net: Move the permission check in sock_diag_put_filterinfo to
packet_diag_dump
net: Add variants of capable for use on on sockets
net: Add variants of capable for use on netlink messages
net: Use netlink_ns_capable to verify the permisions of netlink
messages
Mike Pecovnik (1):
net: Fix permission check in netlink_connect()
crypto/crypto_user.c | 2 +-
drivers/connector/cn_proc.c | 2 +-
drivers/scsi/scsi_netlink.c | 2 +-
include/linux/netlink.h | 7 ++++
include/linux/sock_diag.h | 2 +-
include/net/sock.h | 5 +++
kernel/audit.c | 4 +--
net/can/gw.c | 4 +--
net/core/rtnetlink.c | 20 ++++++-----
net/core/sock.c | 49 ++++++++++++++++++++++++++
net/core/sock_diag.c | 4 +--
net/dcb/dcbnl.c | 2 +-
net/decnet/dn_dev.c | 4 +--
net/decnet/dn_fib.c | 4 +--
net/decnet/netfilter/dn_rtmsg.c | 2 +-
net/netfilter/nfnetlink.c | 2 +-
net/netlink/af_netlink.c | 77 +++++++++++++++++++++++++++++++++++++----
net/netlink/genetlink.c | 2 +-
net/packet/diag.c | 7 +++-
net/phonet/pn_netlink.c | 8 ++---
net/sched/act_api.c | 2 +-
net/sched/cls_api.c | 2 +-
net/sched/sch_api.c | 6 ++--
net/tipc/netlink.c | 2 +-
net/xfrm/xfrm_user.c | 2 +-
25 files changed, 178 insertions(+), 45 deletions(-)
--
2.0.0
More information about the kernel-team
mailing list