6c8161d69f
Hello, Last November a bug was found in iproute. CAN-2003-0856 has more information. Basically, netlink packets can come from any user. If a program performs action based on netlink packets, they must be examined to make sure they came from the place they are expected (the kernel). Attached is a patch against pre8. Please apply this before releasing 1.00 final. All users of busy box may be vulnerable to local attacks without it. Best Regards, Steve Grubb |
||
---|---|---|
.. | ||
linux | ||
ip_common.h | ||
ip_parse_common_args.c | ||
ipaddress.c | ||
iplink.c | ||
iproute.c | ||
iptunnel.c | ||
libnetlink.c | ||
libnetlink.h | ||
ll_addr.c | ||
ll_map.c | ||
ll_map.h | ||
ll_proto.c | ||
ll_types.c | ||
Makefile | ||
Makefile.in | ||
rt_names.c | ||
rt_names.h | ||
rtm_map.c | ||
rtm_map.h | ||
utils.c | ||
utils.h |