[Trusty] [CVE-2014-0181] [PATCH 0/6] Fix CVE-2014-0181 on trusty.

Maarten Lankhorst maarten.lankhorst at canonical.com
Tue Jul 8 11:51:27 UTC 2014


op 07-07-14 17:03, Tim Gardner schreef:
> On 07/03/2014 01:53 PM, Maarten Lankhorst wrote:
>> I also added "net: Fix permission check in netlink_connect", just in case.
>> Without it a hunk fails to apply, and it matches the 1.15 behavior so I felt
>> it was useful to backport too, given the nature of the CVE.
>>
>> Eric W. Biederman (5):
>>    netlink: Rename netlink_capable netlink_allowed
>>    net: Move the permission check in sock_diag_put_filterinfo to
>>      packet_diag_dump
>>    net: Add variants of capable for use on on sockets
>>    net: Add variants of capable for use on netlink messages
>>    net: Use netlink_ns_capable to verify the permisions of netlink
>>      messages
>>
>> Mike Pecovnik (1):
>>    net: Fix permission check in netlink_connect()
>>
>>   crypto/crypto_user.c            |  2 +-
>>   drivers/connector/cn_proc.c     |  2 +-
>>   drivers/scsi/scsi_netlink.c     |  2 +-
>>   include/linux/netlink.h         |  7 ++++
>>   include/linux/sock_diag.h       |  2 +-
>>   include/net/sock.h              |  5 +++
>>   kernel/audit.c                  |  4 +--
>>   net/can/gw.c                    |  4 +--
>>   net/core/rtnetlink.c            | 20 ++++++-----
>>   net/core/sock.c                 | 49 ++++++++++++++++++++++++++
>>   net/core/sock_diag.c            |  4 +--
>>   net/dcb/dcbnl.c                 |  2 +-
>>   net/decnet/dn_dev.c             |  4 +--
>>   net/decnet/dn_fib.c             |  4 +--
>>   net/decnet/netfilter/dn_rtmsg.c |  2 +-
>>   net/netfilter/nfnetlink.c       |  2 +-
>>   net/netlink/af_netlink.c        | 77 +++++++++++++++++++++++++++++++++++++----
>>   net/netlink/genetlink.c         |  2 +-
>>   net/packet/diag.c               |  7 +++-
>>   net/phonet/pn_netlink.c         |  8 ++---
>>   net/sched/act_api.c             |  2 +-
>>   net/sched/cls_api.c             |  2 +-
>>   net/sched/sch_api.c             |  6 ++--
>>   net/tipc/netlink.c              |  2 +-
>>   net/xfrm/xfrm_user.c            |  2 +-
>>   25 files changed, 178 insertions(+), 45 deletions(-)
>>
>
> How about a pull request ? Picking more then about 2 patches in kind of tedious.
>
I would love to, but I don't have an account at kernel.ubuntu.com yet. :-)

Soon!(TM)

~Maarten





More information about the kernel-team mailing list