* Review request for LIN1019-4731/LIN1018-6238 Security Advisory - linux - CVE-2020-10751
@ 2020-06-03 7:57 Ovidiu Panait
2020-06-03 8:18 ` Greg Kroah-Hartman
0 siblings, 1 reply; 2+ messages in thread
From: Ovidiu Panait @ 2020-06-03 7:57 UTC (permalink / raw)
To: xiao.zhang, yue.tao
Cc: lpd-eng-rr, stable, Paul Moore, Greg Kroah-Hartman, Ovidiu Panait
Summary: Security Advisory - linux - CVE-2020-10751
Tech Review: Xiao
Gatekeeper: Yue Tao
Lockdown Approval (if needed):
Branch Tag: LTS19, LTS18
IP Statement (form link or license statement, usually automated):
Crypto URL(s) (if needed): see http://wiki.wrs.com/PBUeng/LinuxProductDivisionExportProcess
Parent Template (where applicable):
-------------------------------------
Impacted area Impact y/n
------------------- -----------
docs/tech-pubs n
tests n
build system n
host dependencies n
RPM/packaging n
toolchain n
kernel code y
user code n
configuration files n
target configuration n
Other n
Applicable to Yocto/upstream n
New Kernel Warnings n
Comments (indicate scope for each "y" above):
---------------------------------------------
From 11d31c9c777c235630d9a72bf316f48c5036e609 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Tue, 28 Apr 2020 09:59:02 -0400
Subject: [PATCH] selinux: properly handle multiple messages in
selinux_netlink_send()
commit fb73974172ffaaf57a7c42f35424d9aece1a5af6 upstream.
Fix the SELinux netlink_send hook to properly handle multiple netlink
messages in a single sk_buff; each message is parsed and subject to
SELinux access control. Prior to this patch, SELinux only inspected
the first message in the sk_buff.
Cc: stable@vger.kernel.org
Reported-by: Dmitry Vyukov <dvyukov@google.com>
Reviewed-by: Stephen Smalley <stephen.smalley.work@gmail.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
[OP: backport of eeef0d9fd40 from branch linux-5.4.y of linux-stable]
Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
Added Files:
------------
No.
Removed Files:
--------------
No.
Remaining Changes (diffstat):
-----------------------------
security/selinux/hooks.c | 70 ++++++++++++++++++++++++++--------------
1 file changed, 45 insertions(+), 25 deletions(-)
Testing Applicable to:
----------------------
intel-x86-64
Testing Commands:
-----------------
CONFIG_SECURITY_SELINUX=y
bitbake virtual/kernel
Testing, Expected Results:
--------------------------
Build OK. No build err/warning caused by this modification.
Conditions of submission:
-------------------------
Build OK. No build err/warning caused by this modification.
Boot in qemu OK.
Arch built boot boardname
-------------------------------------
MIPS n n
MIPS64 n n
MIPS64n32 n n
ARM32 n n
ARM64 n n
x86 n n
x86_64 y n intel-x86-64
PPC n n
PPC64 n n
SPARC64 n n
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Review request for LIN1019-4731/LIN1018-6238 Security Advisory - linux - CVE-2020-10751
2020-06-03 7:57 Review request for LIN1019-4731/LIN1018-6238 Security Advisory - linux - CVE-2020-10751 Ovidiu Panait
@ 2020-06-03 8:18 ` Greg Kroah-Hartman
0 siblings, 0 replies; 2+ messages in thread
From: Greg Kroah-Hartman @ 2020-06-03 8:18 UTC (permalink / raw)
To: Ovidiu Panait; +Cc: xiao.zhang, yue.tao, lpd-eng-rr, stable, Paul Moore
On Wed, Jun 03, 2020 at 10:57:00AM +0300, Ovidiu Panait wrote:
> Summary: Security Advisory - linux - CVE-2020-10751
> Tech Review: Xiao
> Gatekeeper: Yue Tao
> Lockdown Approval (if needed):
> Branch Tag: LTS19, LTS18
>
> IP Statement (form link or license statement, usually automated):
> Crypto URL(s) (if needed): see http://wiki.wrs.com/PBUeng/LinuxProductDivisionExportProcess
> Parent Template (where applicable):
>
>
> -------------------------------------
> Impacted area Impact y/n
> ------------------- -----------
> docs/tech-pubs n
> tests n
> build system n
> host dependencies n
> RPM/packaging n
> toolchain n
> kernel code y
> user code n
> configuration files n
> target configuration n
> Other n
> Applicable to Yocto/upstream n
> New Kernel Warnings n
>
>
> Comments (indicate scope for each "y" above):
> ---------------------------------------------
> >From 11d31c9c777c235630d9a72bf316f48c5036e609 Mon Sep 17 00:00:00 2001
> From: Paul Moore <paul@paul-moore.com>
> Date: Tue, 28 Apr 2020 09:59:02 -0400
> Subject: [PATCH] selinux: properly handle multiple messages in
> selinux_netlink_send()
>
> commit fb73974172ffaaf57a7c42f35424d9aece1a5af6 upstream.
>
> Fix the SELinux netlink_send hook to properly handle multiple netlink
> messages in a single sk_buff; each message is parsed and subject to
> SELinux access control. Prior to this patch, SELinux only inspected
> the first message in the sk_buff.
>
> Cc: stable@vger.kernel.org
> Reported-by: Dmitry Vyukov <dvyukov@google.com>
> Reviewed-by: Stephen Smalley <stephen.smalley.work@gmail.com>
> Signed-off-by: Paul Moore <paul@paul-moore.com>
> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> [OP: backport of eeef0d9fd40 from branch linux-5.4.y of linux-stable]
> Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
>
> Added Files:
> ------------
> No.
>
> Removed Files:
> --------------
> No.
>
> Remaining Changes (diffstat):
> -----------------------------
> security/selinux/hooks.c | 70 ++++++++++++++++++++++++++--------------
> 1 file changed, 45 insertions(+), 25 deletions(-)
>
> Testing Applicable to:
> ----------------------
> intel-x86-64
>
> Testing Commands:
> -----------------
> CONFIG_SECURITY_SELINUX=y
> bitbake virtual/kernel
>
> Testing, Expected Results:
> --------------------------
> Build OK. No build err/warning caused by this modification.
>
> Conditions of submission:
> -------------------------
> Build OK. No build err/warning caused by this modification.
> Boot in qemu OK.
>
> Arch built boot boardname
> -------------------------------------
> MIPS n n
> MIPS64 n n
> MIPS64n32 n n
> ARM32 n n
> ARM64 n n
> x86 n n
> x86_64 y n intel-x86-64
> PPC n n
> PPC64 n n
> SPARC64 n n
What is this message for? What are we supposed to do with it?
confused,
greg k-h
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2020-06-03 8:18 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-06-03 7:57 Review request for LIN1019-4731/LIN1018-6238 Security Advisory - linux - CVE-2020-10751 Ovidiu Panait
2020-06-03 8:18 ` Greg Kroah-Hartman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).