From f70c487fdb567cdd650d03d0f3eaa82d2480a267 Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Wed, 11 Nov 2015 11:24:30 -0500 Subject: Linux v4.3 --- x86-Restrict-MSR-access-when-module-loading-is-restr.patch | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) (limited to 'x86-Restrict-MSR-access-when-module-loading-is-restr.patch') diff --git a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch index 9053f2aea..5c91ab143 100644 --- a/x86-Restrict-MSR-access-when-module-loading-is-restr.patch +++ b/x86-Restrict-MSR-access-when-module-loading-is-restr.patch @@ -1,6 +1,8 @@ +From c076ed5eed97cba612d7efec41359815c5547f4c Mon Sep 17 00:00:00 2001 From: Matthew Garrett Date: Fri, 8 Feb 2013 11:12:13 -0800 -Subject: [PATCH] x86: Restrict MSR access when module loading is restricted +Subject: [PATCH 09/20] x86: Restrict MSR access when module loading is + restricted Writing to MSRs should not be allowed if module loading is restricted, since it could lead to execution of arbitrary code in kernel mode. Based @@ -37,3 +39,6 @@ index 113e70784854..26c2f83fc470 100644 if (copy_from_user(®s, uregs, sizeof regs)) { err = -EFAULT; break; +-- +2.4.3 + -- cgit