[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <426367E2313C2449837CD2DE46E7EAF930DFBAFA@SN2PRD0310MB382.namprd03.prod.outlook.com>
Date: Tue, 6 Nov 2012 15:30:34 +0000
From: KY Srinivasan <kys@...rosoft.com>
To: Tomas Hozza <thozza@...hat.com>,
"gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"devel@...uxdriverproject.org" <devel@...uxdriverproject.org>,
"apw@...onical.com" <apw@...onical.com>,
"jasowang@...hat.com" <jasowang@...hat.com>
CC: Olaf Hering <olaf@...fle.de>
Subject: RE: [PATCH] tools/hv/hv_kvp_daemon.c: Netlink source address
validation allows DoS
> -----Original Message-----
> From: Tomas Hozza [mailto:thozza@...hat.com]
> Sent: Tuesday, November 06, 2012 10:21 AM
> To: gregkh@...uxfoundation.org; linux-kernel@...r.kernel.org;
> devel@...uxdriverproject.org; apw@...onical.com; jasowang@...hat.com
> Cc: Olaf Hering; KY Srinivasan
> Subject: [PATCH] tools/hv/hv_kvp_daemon.c: Netlink source address validation
> allows DoS
>
> Hi.
>
> After discussion with KY Srinivasan and Olaf Hering I'm sending you
> a patch for the HyperV KVP daemon distributed in linux kernel
> "tools/hv/hv_kvp_daemon.c".
>
> There is an issue in the current daemon source causing hyperv kvp daemon
> to exit when it processes a spoofed Netlink packet which has been sent
> from an untrusted local user.
>
> This patch is fixing this, so now the Netlink messages with a non-zero
> nl_pid source address are just ignored.
You don't want to send the patch as an attachment. Please send the patch
as part of the mail.
Regards,
K. Y
>
>
> Regards,
>
> Tomas Hozza
> Associate Software Engineer
> BaseOS - Brno, CZ
Powered by blists - more mailing lists