From 18c82493e579cff717864e8931960040bd820b33 Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Wed, 9 Sep 2015 11:10:06 -0400 Subject: Linux v4.2-10637-ga794b4f32921 - Rework secure boot patchset --- x86-Restrict-MSR-access-when-module-loading-is-restr.patch | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) (limited to 'x86-Restrict-MSR-access-when-module-loading-is-restr.patch') diff --git a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch index 9053f2aea..5c91ab143 100644 --- a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch +++ b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch @@ -1,6 +1,8 @@ +From c076ed5eed97cba612d7efec41359815c5547f4c Mon Sep 17 00:00:00 2001 From: Matthew Garrett Date: Fri, 8 Feb 2013 11:12:13 -0800 -Subject: [PATCH] x86: Restrict MSR access when module loading is restricted +Subject: [PATCH 09/20] x86: Restrict MSR access when module loading is + restricted Writing to MSRs should not be allowed if module loading is restricted, since it could lead to execution of arbitrary code in kernel mode. Based @@ -37,3 +39,6 @@ index 113e70784854..26c2f83fc470 100644 if (copy_from_user(®s, uregs, sizeof regs)) { err = -EFAULT; break; +-- +2.4.3 + -- cgit