[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8cb46dd1-c2eb-869a-0af8-443d84a83b85@gmail.com>
Date: Tue, 15 Feb 2022 13:51:10 -0800
From: Eric Dumazet <eric.dumazet@...il.com>
To: Jinmeng Zhou <jjjinmeng.zhou@...il.com>, marcel@...tmann.org,
johan.hedberg@...il.com, davem@...emloft.net,
Jakub Kicinski <kuba@...nel.org>
Cc: linux-bluetooth@...r.kernel.org, netdev@...r.kernel.org,
shenwenbosmile@...il.com
Subject: Re: 4 missing check bugs
On 2/15/22 04:37, Jinmeng Zhou wrote:
> Dear maintainers,
>
> Hi, our tool finds several missing check bugs on
> Linux kernel v4.18.5 using static analysis.
> We are looking forward to having more experts' eyes on this. Thank you!
>
> Before calling sk_alloc() with SOCK_RAW type,
> there should be a permission check, ns_capable(ns,CAP_NET_RAW).
> For example,
v4.18 is not a stable kernel.
No one is supposed to use v4.18.5, and expect others to fix bugs in it.
Powered by blists - more mailing lists