Applied: [PATCH 0/1] [trusty / lts-utopic] seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO

Kamal Mostafa kamal at canonical.com
Thu Mar 3 21:53:17 UTC 2016


Applied [Trusty/Utopic] with minor cleanups (added BugLink: and
backport lines; fixed whitespace):


commit b0cfc5431e45be9b30b716852378f783a32587c4
Author: Kees Cook <keescook at chromium.org>
Date:   Tue Mar 1 09:47:05 2016 -0800

    seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO
    
    BugLink: http://bugs.launchpad.net/bugs/1496073
    
    The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO
    when setting errno during a SECCOMP_RET_ERRNO filter action.  This makes
    sure we have a reliable value being set, so that an invalid errno will not
    be ignored by userspace.
    
    Signed-off-by: Kees Cook <keescook at chromium.org>
    Reported-by: Dmitry V. Levin <ldv at altlinux.org>
    Cc: Andy Lutomirski <luto at amacapital.net>
    Cc: Will Drewry <wad at chromium.org>
    Signed-off-by: Andrew Morton <akpm at linux-foundation.org>
    Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
    (backport to 3.13 from commit 580c57f1076872ebc2427f898b927944ce170f2d)
    Signed-off-by: Brad Figg <brad.figg at canonical.com>
    Acked-by: Tim Gardner <tim.gardner at canonical.com>
    Signed-off-by: Kamal Mostafa <kamal at canonical.com>




More information about the kernel-team mailing list