Message ID | 20231211205443.429096-2-cascardo@canonical.com |
---|---|
State | New |
Headers | show |
Series | LP: #2046192 | expand |
Thadeu Lima de Souza Cascardo wrote: > BugLink: https://bugs.launchpad.net/bugs/2046192 > > TIOCSTI has been abused as a malicious privilege escalation mechanism and > provides little real-world utility these days. > > Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> Acked-by: Emil Renner Berthing <emil.renner.berthing@canonical.com> > --- > debian.master/config/annotations | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/debian.master/config/annotations b/debian.master/config/annotations > index 281355930640..debfeda4f37d 100644 > --- a/debian.master/config/annotations > +++ b/debian.master/config/annotations > @@ -330,6 +330,9 @@ CONFIG_KVM note<'LP: #1532886'> > CONFIG_LATENCYTOP policy<{'amd64': 'n', 'arm64': 'n', 'armhf': 'n', 'ppc64el': 'n', 'riscv64': 'n', 's390x': 'n'}> > CONFIG_LATENCYTOP note<'LP: #1655986'> > > +CONFIG_LEGACY_TIOCSTI policy<{'amd64': 'n', 'arm64': 'n', 'armhf': 'n', 'ppc64el': 'n', 'riscv64': 'n', 's390x': 'n'}> > +CONFIG_LEGACY_TIOCSTI note<'LP:#2046192'> > + > CONFIG_LOAD_PPC_KEYS policy<{'ppc64el': 'y'}> > CONFIG_LOAD_PPC_KEYS note<'LP: #1866909'> > > @@ -7302,7 +7305,6 @@ CONFIG_LED_TRIGGER_PHY policy<{'amd64': 'y', 'arm64': ' > CONFIG_LEGACY_DIRECT_IO policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> > CONFIG_LEGACY_PTYS policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> > CONFIG_LEGACY_PTY_COUNT policy<{'amd64': '0', 'arm64': '0', 'armhf': '0', 'ppc64el': '0', 'riscv64': '0', 's390x': '0'}> > -CONFIG_LEGACY_TIOCSTI policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> > CONFIG_LEGACY_VSYSCALL_NONE policy<{'amd64': 'n'}> > CONFIG_LEGACY_VSYSCALL_XONLY policy<{'amd64': 'y'}> > CONFIG_LENOVO_YMC policy<{'amd64': 'm'}> > -- > 2.34.1 > > > -- > kernel-team mailing list > kernel-team@lists.ubuntu.com > https://lists.ubuntu.com/mailman/listinfo/kernel-team
On 23/12/11 05:54PM, Thadeu Lima de Souza Cascardo wrote: > BugLink: https://bugs.launchpad.net/bugs/2046192 > > TIOCSTI has been abused as a malicious privilege escalation mechanism and > provides little real-world utility these days. > > Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> > --- > debian.master/config/annotations | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/debian.master/config/annotations b/debian.master/config/annotations > index 281355930640..debfeda4f37d 100644 > --- a/debian.master/config/annotations > +++ b/debian.master/config/annotations > @@ -330,6 +330,9 @@ CONFIG_KVM note<'LP: #1532886'> > CONFIG_LATENCYTOP policy<{'amd64': 'n', 'arm64': 'n', 'armhf': 'n', 'ppc64el': 'n', 'riscv64': 'n', 's390x': 'n'}> > CONFIG_LATENCYTOP note<'LP: #1655986'> > > +CONFIG_LEGACY_TIOCSTI policy<{'amd64': 'n', 'arm64': 'n', 'armhf': 'n', 'ppc64el': 'n', 'riscv64': 'n', 's390x': 'n'}> > +CONFIG_LEGACY_TIOCSTI note<'LP:#2046192'> > + > CONFIG_LOAD_PPC_KEYS policy<{'ppc64el': 'y'}> > CONFIG_LOAD_PPC_KEYS note<'LP: #1866909'> > > @@ -7302,7 +7305,6 @@ CONFIG_LED_TRIGGER_PHY policy<{'amd64': 'y', 'arm64': ' > CONFIG_LEGACY_DIRECT_IO policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> > CONFIG_LEGACY_PTYS policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> > CONFIG_LEGACY_PTY_COUNT policy<{'amd64': '0', 'arm64': '0', 'armhf': '0', 'ppc64el': '0', 'riscv64': '0', 's390x': '0'}> > -CONFIG_LEGACY_TIOCSTI policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> > CONFIG_LEGACY_VSYSCALL_NONE policy<{'amd64': 'n'}> > CONFIG_LEGACY_VSYSCALL_XONLY policy<{'amd64': 'y'}> Acked-by: Andrei Gherzan <andrei.gherzan@canonical.com>
diff --git a/debian.master/config/annotations b/debian.master/config/annotations index 281355930640..debfeda4f37d 100644 --- a/debian.master/config/annotations +++ b/debian.master/config/annotations @@ -330,6 +330,9 @@ CONFIG_KVM note<'LP: #1532886'> CONFIG_LATENCYTOP policy<{'amd64': 'n', 'arm64': 'n', 'armhf': 'n', 'ppc64el': 'n', 'riscv64': 'n', 's390x': 'n'}> CONFIG_LATENCYTOP note<'LP: #1655986'> +CONFIG_LEGACY_TIOCSTI policy<{'amd64': 'n', 'arm64': 'n', 'armhf': 'n', 'ppc64el': 'n', 'riscv64': 'n', 's390x': 'n'}> +CONFIG_LEGACY_TIOCSTI note<'LP:#2046192'> + CONFIG_LOAD_PPC_KEYS policy<{'ppc64el': 'y'}> CONFIG_LOAD_PPC_KEYS note<'LP: #1866909'> @@ -7302,7 +7305,6 @@ CONFIG_LED_TRIGGER_PHY policy<{'amd64': 'y', 'arm64': ' CONFIG_LEGACY_DIRECT_IO policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> CONFIG_LEGACY_PTYS policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> CONFIG_LEGACY_PTY_COUNT policy<{'amd64': '0', 'arm64': '0', 'armhf': '0', 'ppc64el': '0', 'riscv64': '0', 's390x': '0'}> -CONFIG_LEGACY_TIOCSTI policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> CONFIG_LEGACY_VSYSCALL_NONE policy<{'amd64': 'n'}> CONFIG_LEGACY_VSYSCALL_XONLY policy<{'amd64': 'y'}> CONFIG_LENOVO_YMC policy<{'amd64': 'm'}>
BugLink: https://bugs.launchpad.net/bugs/2046192 TIOCSTI has been abused as a malicious privilege escalation mechanism and provides little real-world utility these days. Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> --- debian.master/config/annotations | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)