[PATCH 2/3] af_802154: Disable auto-loading as mitigation against local exploits
authorBen Hutchings <ben@decadent.org.uk>
Fri, 19 Nov 2010 02:12:48 +0000 (02:12 +0000)
committerSalvatore Bonaccorso <carnil@debian.org>
Sat, 13 Jul 2024 15:45:02 +0000 (17:45 +0200)
commit5398da2a548de720acfc4341ce9324f007e719ee
tree9f2c586dffd509569e0a64da3376ed59aeb8a0a2
parent6e4ba5d02f5d32f784d62f5e094d1695739b4a28
[PATCH 2/3] af_802154: Disable auto-loading as mitigation against local exploits

Forwarded: not-needed

Recent review has revealed several bugs in obscure protocol
implementations that can be exploited by local users for denial of
service or privilege escalation.  We can mitigate the effect of any
remaining vulnerabilities in such protocols by preventing unprivileged
users from loading the modules, so that they are only exploitable on
systems where the administrator has chosen to load the protocol.

The 'af_802154' (IEEE 802.15.4) protocol is not widely used, was
not present in the 'lenny' kernel, and seems to receive only sporadic
maintenance.  Therefore disable auto-loading.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic debian
Gbp-Pq: Name af_802154-Disable-auto-loading-as-mitigation-against.patch
net/ieee802154/socket.c