aa675b572f
with the IP_HDRINCL option set. Without this change, a Linux process with access to a raw socket could cause a kernel panic. Raw sockets must be created by root, and are generally not consigned to untrusted applications; hence, the security implications of this bug are minimal. I believe this only affects 6-CURRENT on or after 2005-01-30. Found by: Coverity Prevent analysis tool Security: Local DOS |
||
---|---|---|
.. | ||
linux_file.c | ||
linux_getcwd.c | ||
linux_ioctl.c | ||
linux_ioctl.h | ||
linux_ipc.c | ||
linux_ipc.h | ||
linux_mib.c | ||
linux_mib.h | ||
linux_misc.c | ||
linux_signal.c | ||
linux_signal.h | ||
linux_socket.c | ||
linux_socket.h | ||
linux_stats.c | ||
linux_sysctl.c | ||
linux_sysproto.h | ||
linux_uid16.c | ||
linux_util.c | ||
linux_util.h |