summaryrefslogtreecommitdiffstats
path: root/kernel.spec
diff options
context:
space:
mode:
authorJosh Boyer <jwboyer@fedoraproject.org>2014-12-18 16:17:32 -0500
committerJosh Boyer <jwboyer@fedoraproject.org>2014-12-18 16:17:37 -0500
commit363cd71ff322e841027b4ec4436004e0bad98be0 (patch)
tree514fe687849316608792f5fdfb2def33ea7c7f99 /kernel.spec
parent672002c87d3b969328359938ad9dbe7d5074dfff (diff)
downloadkernel-363cd71ff322e841027b4ec4436004e0bad98be0.tar.gz
kernel-363cd71ff322e841027b4ec4436004e0bad98be0.tar.xz
kernel-363cd71ff322e841027b4ec4436004e0bad98be0.zip
CVE-2014-8989 userns can bypass group restrictions (rhbz 1170684 1170688)
Diffstat (limited to 'kernel.spec')
-rw-r--r--kernel.spec35
1 files changed, 35 insertions, 0 deletions
diff --git a/kernel.spec b/kernel.spec
index 764869485..264712200 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -645,6 +645,23 @@ Patch26106: dm-cache-fix-spurious-cell_defer-when-dealing-with-p.patch
Patch26107: uapi-linux-target_core_user.h-fix-headers_install.sh.patch
+#mount fixes for stable
+Patch26108: mnt-Implicitly-add-MNT_NODEV-on-remount-when-it-was-.patch
+Patch26109: mnt-Update-unprivileged-remount-test.patch
+Patch26110: umount-Disallow-unprivileged-mount-force.patch
+
+#CVE-2014-8989 rhbz 1170684 1170688
+Patch26111: groups-Consolidate-the-setgroups-permission-checks.patch
+Patch26112: userns-Document-what-the-invariant-required-for-safe.patch
+Patch26113: userns-Don-t-allow-setgroups-until-a-gid-mapping-has.patch
+Patch26114: userns-Don-t-allow-unprivileged-creation-of-gid-mapp.patch
+Patch26115: userns-Check-euid-no-fsuid-when-establishing-an-unpr.patch
+Patch26116: userns-Only-allow-the-creator-of-the-userns-unprivil.patch
+Patch26117: userns-Rename-id_map_mutex-to-userns_state_mutex.patch
+Patch26118: userns-Add-a-knob-to-disable-setgroups-on-a-per-user.patch
+Patch26119: userns-Allow-setting-gid_maps-without-privilege-when.patch
+Patch26120: userns-Unbreak-the-unprivileged-remount-tests.patch
+
# git clone ssh://git.fedorahosted.org/git/kernel-arm64.git, git diff master...devel
Patch30000: kernel-arm64.patch
@@ -1398,6 +1415,23 @@ ApplyPatch dm-cache-fix-spurious-cell_defer-when-dealing-with-p.patch
ApplyPatch uapi-linux-target_core_user.h-fix-headers_install.sh.patch
+#mount fixes for stable
+ApplyPatch mnt-Implicitly-add-MNT_NODEV-on-remount-when-it-was-.patch
+ApplyPatch mnt-Update-unprivileged-remount-test.patch
+ApplyPatch umount-Disallow-unprivileged-mount-force.patch
+
+#CVE-2014-8989 rhbz 1170684 1170688
+ApplyPatch groups-Consolidate-the-setgroups-permission-checks.patch
+ApplyPatch userns-Document-what-the-invariant-required-for-safe.patch
+ApplyPatch userns-Don-t-allow-setgroups-until-a-gid-mapping-has.patch
+ApplyPatch userns-Don-t-allow-unprivileged-creation-of-gid-mapp.patch
+ApplyPatch userns-Check-euid-no-fsuid-when-establishing-an-unpr.patch
+ApplyPatch userns-Only-allow-the-creator-of-the-userns-unprivil.patch
+ApplyPatch userns-Rename-id_map_mutex-to-userns_state_mutex.patch
+ApplyPatch userns-Add-a-knob-to-disable-setgroups-on-a-per-user.patch
+ApplyPatch userns-Allow-setting-gid_maps-without-privilege-when.patch
+ApplyPatch userns-Unbreak-the-unprivileged-remount-tests.patch
+
%if 0%{?aarch64patches}
ApplyPatch kernel-arm64.patch
%ifnarch aarch64 # this is stupid, but i want to notice before secondary koji does.
@@ -2267,6 +2301,7 @@ fi
# || ||
%changelog
* Thu Dec 18 2014 Josh Boyer <jwboyer@fedoraproject.org>
+- CVE-2014-8989 userns can bypass group restrictions (rhbz 1170684 1170688)
- Fix from Kyle McMartin for target_core_user uapi issue since it's enabled
- Fix dm-cache crash (rhbz 1168434)
- Fix blk-mq crash on CPU hotplug (rhbz 1175261)