lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20190924.163836.698259609196514149.davem@davemloft.net>
Date:   Tue, 24 Sep 2019 16:38:36 +0200 (CEST)
From:   David Miller <davem@...emloft.net>
To:     gregkh@...uxfoundation.org
Cc:     netdev@...r.kernel.org, isdn@...ux-pingi.de, jreuter@...na.de,
        ralf@...ux-mips.org, alex.aring@...il.com,
        stefan@...enfreihafen.org, orinimron123@...il.com
Subject: Re: [PATCH 0/5] Raw socket cleanups

From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Date: Fri, 20 Sep 2019 09:35:44 +0200

> Ori Nimron pointed out that there are a number of places in the kernel
> where you can create a raw socket, without having to have the
> CAP_NET_RAW permission.
> 
> To resolve this, here's a short patch series to test these odd and old
> protocols for this permission before allowing the creation to succeed
> 
> All patches are currently against the net tree.

Applied and queued up for -stable.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ