lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 13 Feb 2021 09:25:31 +0100 From: Greg Kroah-Hartman <gregkh@...uxfoundation.org> To: Dmitry Baryshkov <dmitry.baryshkov@...aro.org> Cc: Arnd Bergmann <arnd@...db.de>, linux-kernel@...r.kernel.org, Srinivas Kandagatla <srinivas.kandagatla@...aro.org>, Jonathan Marek <jonathan@...ek.ca>, stable@...r.kernel.org Subject: Re: [PATCH v2] misc: fastrpc: restrict user apps from sending kernel RPC messages On Fri, Feb 12, 2021 at 10:26:58PM +0300, Dmitry Baryshkov wrote: > Verify that user applications are not using the kernel RPC message > handle to restrict them from directly attaching to guest OS on the > remote subsystem. This is a port of CVE-2019-2308 fix. A port of the fix of what to what? Is this to go only into a stable tree (if so what ones and what is the id in Linus's tree), or is it to go into Linus's tree like normal (if so how can this be a port)? thanks, greg k-h
Powered by blists - more mailing lists