[Trusty] [CVE-2014-0181] [PATCH 0/6] Fix CVE-2014-0181 on trusty.

Tim Gardner tim.gardner at canonical.com
Mon Jul 7 15:03:55 UTC 2014


On 07/03/2014 01:53 PM, Maarten Lankhorst wrote:
> I also added "net: Fix permission check in netlink_connect", just in case.
> Without it a hunk fails to apply, and it matches the 1.15 behavior so I felt
> it was useful to backport too, given the nature of the CVE.
>
> Eric W. Biederman (5):
>    netlink: Rename netlink_capable netlink_allowed
>    net: Move the permission check in sock_diag_put_filterinfo to
>      packet_diag_dump
>    net: Add variants of capable for use on on sockets
>    net: Add variants of capable for use on netlink messages
>    net: Use netlink_ns_capable to verify the permisions of netlink
>      messages
>
> Mike Pecovnik (1):
>    net: Fix permission check in netlink_connect()
>
>   crypto/crypto_user.c            |  2 +-
>   drivers/connector/cn_proc.c     |  2 +-
>   drivers/scsi/scsi_netlink.c     |  2 +-
>   include/linux/netlink.h         |  7 ++++
>   include/linux/sock_diag.h       |  2 +-
>   include/net/sock.h              |  5 +++
>   kernel/audit.c                  |  4 +--
>   net/can/gw.c                    |  4 +--
>   net/core/rtnetlink.c            | 20 ++++++-----
>   net/core/sock.c                 | 49 ++++++++++++++++++++++++++
>   net/core/sock_diag.c            |  4 +--
>   net/dcb/dcbnl.c                 |  2 +-
>   net/decnet/dn_dev.c             |  4 +--
>   net/decnet/dn_fib.c             |  4 +--
>   net/decnet/netfilter/dn_rtmsg.c |  2 +-
>   net/netfilter/nfnetlink.c       |  2 +-
>   net/netlink/af_netlink.c        | 77 +++++++++++++++++++++++++++++++++++++----
>   net/netlink/genetlink.c         |  2 +-
>   net/packet/diag.c               |  7 +++-
>   net/phonet/pn_netlink.c         |  8 ++---
>   net/sched/act_api.c             |  2 +-
>   net/sched/cls_api.c             |  2 +-
>   net/sched/sch_api.c             |  6 ++--
>   net/tipc/netlink.c              |  2 +-
>   net/xfrm/xfrm_user.c            |  2 +-
>   25 files changed, 178 insertions(+), 45 deletions(-)
>

How about a pull request ? Picking more then about 2 patches in kind of 
tedious.

-- 
Tim Gardner tim.gardner at canonical.com




More information about the kernel-team mailing list