|
|
Message-ID: <20100114005451.GA8494@lackof.org>
Date: Wed, 13 Jan 2010 17:54:51 -0700
From: dann frazier <dannf@...nf.org>
To: oss-security@...ts.openwall.com
Cc: fwestphal@...aro.com, kaber@...sh.net
Subject: CVE Request: kernel ebtables perm check
Has a CVE been assigned for this issue yet?
commit dce766af541f6605fa9889892c0280bab31c66ab
Author: Florian Westphal <fwestphal@...aro.com>
Date: Fri Jan 8 17:31:24 2010 +0100
netfilter: ebtables: enforce CAP_NET_ADMIN
normal users are currently allowed to set/modify ebtables rules.
Restrict it to processes with CAP_NET_ADMIN.
Note that this cannot be reproduced with unmodified ebtables
binary
because it uses SOCK_RAW.
Signed-off-by: Florian Westphal <fwestphal@...aro.com>
Cc: stable@...nel.org
Signed-off-by: Patrick McHardy <kaber@...sh.net>
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.