Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- commit a072d3e9840e924180044f9b68041b5c338a812b
- Author: Phil Blundell <philb@gnu.org>
- Date: Wed Nov 24 11:51:47 2010 -0800
- econet: fix CVE-2010-3848
- commit a27e13d370415add3487949c60810e36069a23a6 upstream.
- Don't declare variable sized array of iovecs on the stack since this
- could cause stack overflow if msg->msgiovlen is large. Instead, coalesce
- the user-supplied data into a new buffer and use a single iovec for it.
- Signed-off-by: Phil Blundell <philb@gnu.org>
- Signed-off-by: David S. Miller <davem@davemloft.net>
- Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
- commit 29d0e9fdced7e35db2ac8ecea49e5bc3c7115b98
- Author: Phil Blundell <philb@gnu.org>
- Date: Wed Nov 24 11:49:53 2010 -0800
- econet: fix CVE-2010-3850
- commit 16c41745c7b92a243d0874f534c1655196c64b74 upstream.
- Add missing check for capable(CAP_NET_ADMIN) in SIOCSIFADDR operation.
- Signed-off-by: Phil Blundell <philb@gnu.org>
- Signed-off-by: David S. Miller <davem@davemloft.net>
- Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
- commit 3ca62aac185300f80dad0e412c1033d2ef8a1b44
- Author: Phil Blundell <philb@gnu.org>
- Date: Wed Nov 24 11:49:19 2010 -0800
- econet: disallow NULL remote addr for sendmsg(), fixes CVE-2010-3849
- commit fa0e846494792e722d817b9d3d625a4ef4896c96 upstream.
- Later parts of econet_sendmsg() rely on saddr != NULL, so return early
- with EINVAL if NULL was passed otherwise an oops may occur.
- Signed-off-by: Phil Blundell <philb@gnu.org>
- Signed-off-by: David S. Miller <davem@davemloft.net>
- Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement