[SRU][Trusty][Zesty][PATCH 0/1] Fix for CVE-2017-14140

Thadeu Lima de Souza Cascardo cascardo at canonical.com
Tue Dec 12 20:13:18 UTC 2017


On Thu, Dec 07, 2017 at 12:56:45PM +0100, Kleber Sacilotto de Souza wrote:
> Only Trusty and Zesty are affected by CVE-2017-14140.
> 
> The backport for Zesty was needed to adjust for context. Trusty
> doesn't have caaee6234d05a ("ptrace: use fsuid, fsgid, effective creds
> for fs access checks") which adds the definition and the checks for
> PTRACE_MODE_READ_REALCREDS, whoever checking for PTRACE_MODE_READ should
> be enough.
> 

When first looking at caaee6234d05a, I thought why not pick it up. But
looking at this specific issue of move_pages, it seems to warrant a fix
of its own. If we ever pick up caaee6234d05a for trusty, we'd better
remember to fix this up.

Acked-by: Thadeu Lima de Souza Cascardo <cascardo at canonical.com>

> Linus Torvalds (1):
>   Sanitize 'move_pages()' permission checks
> 
>  mm/migrate.c | 11 +++--------
>  1 file changed, 3 insertions(+), 8 deletions(-)
> 
> -- 
> 2.14.1
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team




More information about the kernel-team mailing list