Re: [PATCH v2 0/3] possible privilege escalation via SG_IO ioctl(CVE-2011-4127)
From: Paolo Bonzini
Date: Mon Jan 16 2012 - 03:54:15 EST
On 01/16/2012 02:04 AM, Douglas Gilbert wrote:
Tested on top of 3.2 + Linus's patch to sanitize ioctl return values.
Is that a fixed version of patch at the end of this post:
http://marc.info/?l=linux-kernel&m=132578310403616&w=2
The fix being
s/ENOIOCTLCMD/-ENOIOCTLCMD/
in is_unrecognized_ioctl() ?
Yes. I cherry-picked it from Linus's tree.
Also could you post "PATCH v2 3/3 ..." to this list as well so
we have a complete set?
FWIW, 3/3 only touches LVM.
Paolo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/