Applied: [PATCH 0/1] [trusty / lts-utopic] seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO
Kamal Mostafa
kamal at canonical.com
Thu Mar 3 21:53:17 UTC 2016
Applied [Trusty/Utopic] with minor cleanups (added BugLink: and
backport lines; fixed whitespace):
commit b0cfc5431e45be9b30b716852378f783a32587c4
Author: Kees Cook <keescook at chromium.org>
Date: Tue Mar 1 09:47:05 2016 -0800
seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO
BugLink: http://bugs.launchpad.net/bugs/1496073
The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO
when setting errno during a SECCOMP_RET_ERRNO filter action. This makes
sure we have a reliable value being set, so that an invalid errno will not
be ignored by userspace.
Signed-off-by: Kees Cook <keescook at chromium.org>
Reported-by: Dmitry V. Levin <ldv at altlinux.org>
Cc: Andy Lutomirski <luto at amacapital.net>
Cc: Will Drewry <wad at chromium.org>
Signed-off-by: Andrew Morton <akpm at linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
(backport to 3.13 from commit 580c57f1076872ebc2427f898b927944ce170f2d)
Signed-off-by: Brad Figg <brad.figg at canonical.com>
Acked-by: Tim Gardner <tim.gardner at canonical.com>
Signed-off-by: Kamal Mostafa <kamal at canonical.com>
More information about the kernel-team
mailing list