From d8ad9d50bddc32cc8a19e5d74db6a8434128b9fc Mon Sep 17 00:00:00 2001 From: Ben Hutchings Date: Fri, 19 Nov 2010 02:12:48 +0000 Subject: [PATCH] [PATCH 1/3] rds: Disable auto-loading as mitigation against local exploits Forwarded: not-needed Recent review has revealed several bugs in obscure protocol implementations that can be exploited by local users for denial of service or privilege escalation. We can mitigate the effect of any remaining vulnerabilities in such protocols by preventing unprivileged users from loading the modules, so that they are only exploitable on systems where the administrator has chosen to load the protocol. The 'rds' protocol is one such protocol that has been found to be vulnerable, and which was not present in the 'lenny' kernel. Therefore disable auto-loading. Signed-off-by: Ben Hutchings Gbp-Pq: Topic debian Gbp-Pq: Name rds-Disable-auto-loading-as-mitigation-against-local.patch --- net/rds/af_rds.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/rds/af_rds.c b/net/rds/af_rds.c index b239120dd9c..bdb5c605e1a 100644 --- a/net/rds/af_rds.c +++ b/net/rds/af_rds.c @@ -960,4 +960,4 @@ MODULE_DESCRIPTION("RDS: Reliable Datagram Sockets" " v" DRV_VERSION " (" DRV_RELDATE ")"); MODULE_VERSION(DRV_VERSION); MODULE_LICENSE("Dual BSD/GPL"); -MODULE_ALIAS_NETPROTO(PF_RDS); +/* MODULE_ALIAS_NETPROTO(PF_RDS); */ -- 2.30.2