[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20190924.163836.698259609196514149.davem@davemloft.net>
Date: Tue, 24 Sep 2019 16:38:36 +0200 (CEST)
From: David Miller <davem@...emloft.net>
To: gregkh@...uxfoundation.org
Cc: netdev@...r.kernel.org, isdn@...ux-pingi.de, jreuter@...na.de,
ralf@...ux-mips.org, alex.aring@...il.com,
stefan@...enfreihafen.org, orinimron123@...il.com
Subject: Re: [PATCH 0/5] Raw socket cleanups
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Date: Fri, 20 Sep 2019 09:35:44 +0200
> Ori Nimron pointed out that there are a number of places in the kernel
> where you can create a raw socket, without having to have the
> CAP_NET_RAW permission.
>
> To resolve this, here's a short patch series to test these odd and old
> protocols for this permission before allowing the creation to succeed
>
> All patches are currently against the net tree.
Applied and queued up for -stable.
Powered by blists - more mailing lists