Commit ec5587e9 authored by Thomas Gleixner's avatar Thomas Gleixner Committed by Juerg Haefliger

UBUNTU: SAUCE: seccomp: Use PR_SPEC_FORCE_DISABLE

CVE-2018-3639 (x86)

Use PR_SPEC_FORCE_DISABLE in seccomp() because seccomp does not allow to
widen restrictions.
Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
Signed-off-by: default avatarStefan Bader <stefan.bader@canonical.com>
Signed-off-by: default avatarJuerg Haefliger <juergh@canonical.com>
parent a5047e98
......@@ -236,7 +236,7 @@ static inline void spec_mitigate(struct task_struct *task,
int state = arch_prctl_spec_ctrl_get(task, which);
if (state > 0 && (state & PR_SPEC_PRCTL))
arch_prctl_spec_ctrl_set(task, which, PR_SPEC_DISABLE);
arch_prctl_spec_ctrl_set(task, which, PR_SPEC_FORCE_DISABLE);
}
static inline void seccomp_assign_mode(struct task_struct *task,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment