From: Greg Kroah-Hartman Date: Wed, 10 Apr 2024 19:10:37 +0000 (+0200) Subject: 5.4-stable patches X-Git-Tag: v4.19.312~51 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=150447289a13938b1c7e5966b6c11ef5b8260a90;p=thirdparty%2Fkernel%2Fstable-queue.git 5.4-stable patches added patches: tty-n_gsm-require-cap_net_admin-to-attach-n_gsm0710-ldisc.patch --- diff --git a/queue-5.4/series b/queue-5.4/series index 18a87693d1f..cf1da9471e0 100644 --- a/queue-5.4/series +++ b/queue-5.4/series @@ -202,3 +202,4 @@ netfilter-nf_tables-reject-new-basechain-after-table.patch netfilter-nf_tables-release-batch-on-table-validatio.patch netfilter-nf_tables-release-mutex-after-nft_gc_seq_e.patch netfilter-nf_tables-discard-table-flag-update-with-p.patch +tty-n_gsm-require-cap_net_admin-to-attach-n_gsm0710-ldisc.patch diff --git a/queue-5.4/tty-n_gsm-require-cap_net_admin-to-attach-n_gsm0710-ldisc.patch b/queue-5.4/tty-n_gsm-require-cap_net_admin-to-attach-n_gsm0710-ldisc.patch new file mode 100644 index 00000000000..6e853a1271a --- /dev/null +++ b/queue-5.4/tty-n_gsm-require-cap_net_admin-to-attach-n_gsm0710-ldisc.patch @@ -0,0 +1,34 @@ +From 67c37756898a5a6b2941a13ae7260c89b54e0d88 Mon Sep 17 00:00:00 2001 +From: Thadeu Lima de Souza Cascardo +Date: Mon, 31 Jul 2023 15:59:42 -0300 +Subject: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc + +From: Thadeu Lima de Souza Cascardo + +commit 67c37756898a5a6b2941a13ae7260c89b54e0d88 upstream. + +Any unprivileged user can attach N_GSM0710 ldisc, but it requires +CAP_NET_ADMIN to create a GSM network anyway. + +Require initial namespace CAP_NET_ADMIN to do that. + +Signed-off-by: Thadeu Lima de Souza Cascardo +Link: https://lore.kernel.org/r/20230731185942.279611-1-cascardo@canonical.com +From: Salvatore Bonaccorso +Signed-off-by: Greg Kroah-Hartman +--- + drivers/tty/n_gsm.c | 3 +++ + 1 file changed, 3 insertions(+) + +--- a/drivers/tty/n_gsm.c ++++ b/drivers/tty/n_gsm.c +@@ -2567,6 +2567,9 @@ static int gsmld_open(struct tty_struct + struct gsm_mux *gsm; + int ret; + ++ if (!capable(CAP_NET_ADMIN)) ++ return -EPERM; ++ + if (tty->ops->write == NULL) + return -EINVAL; +