DivestOS/Patches/Linux_CVEs/CVE-2016-0806/qcacld-2.0/0018.patch
2017-11-07 18:55:10 -05:00

42 lines
1.6 KiB
Diff

From 825827ab2aa271f23f48aa683046a3aa3f7fe90e Mon Sep 17 00:00:00 2001
From: Amarnath Hullur Subramanyam <amarnath@codeaurora.org>
Date: Wed, 28 Oct 2015 21:04:10 -0700
Subject: wlan:Check priviledge permission before processing SET_PACKET_FILTER
IOCTL
Kernel assumes all SET IOCTL commands are assigned with even
numbers. But in our WLAN driver, some SET IOCTLS are assigned with
odd numbers. This leads kernel fail to check, for some SET IOCTLs,
whether user has the right permission to do SET operation.
Hence, in driver, before processing SET_PACKET_FILTER IOCTL, making
sure user task has right permission to process the command.
CRs-Fixed: 930937
Git-commit: 88ce639e7a0bba852f193b6f53b7ca1926a09b02
Bug: 25344453
Signed-off-by: Amarnath Hullur Subramanyam <amarnath@codeaurora.org>
---
drivers/staging/qcacld-2.0/CORE/HDD/src/wlan_hdd_wext.c | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/drivers/staging/qcacld-2.0/CORE/HDD/src/wlan_hdd_wext.c b/drivers/staging/qcacld-2.0/CORE/HDD/src/wlan_hdd_wext.c
index 88d75c1..09d7288 100644
--- a/drivers/staging/qcacld-2.0/CORE/HDD/src/wlan_hdd_wext.c
+++ b/drivers/staging/qcacld-2.0/CORE/HDD/src/wlan_hdd_wext.c
@@ -8720,6 +8720,12 @@ static int iw_set_packet_filter_params(struct net_device *dev,
int ret;
struct iw_point s_priv_data;
+ if (!capable(CAP_NET_ADMIN)) {
+ VOS_TRACE(VOS_MODULE_ID_HDD, VOS_TRACE_LEVEL_ERROR,
+ FL("permission check failed"));
+ return -EPERM;
+ }
+
if (hdd_priv_get_data(&s_priv_data, wrqu)) {
return -EINVAL;
}
--
cgit v1.1