Files
linux/kernel
Ben Hutchings fa20cb40aa module: Invalidate signatures on force-loaded modules
commit bca014caaa upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Willy Tarreau <w@1wt.eu>
2016-08-27 11:40:39 +02:00
..
2016-03-03 15:06:20 -08:00
2013-04-22 07:09:06 -07:00
2014-11-21 09:22:52 -08:00
2012-05-31 17:49:27 -07:00
2012-03-28 18:30:03 +01:00
2013-04-15 13:25:16 +02:00
2012-05-29 23:28:41 -04:00
2013-05-05 00:16:35 -04:00
2014-07-17 15:58:04 -07:00
2014-06-07 13:25:30 -07:00