[LTP] [PATCH] Add tags to setsockopt04 and add it to the CVE runfile

Martin Doucha mdoucha@suse.cz
Wed Apr 22 12:20:07 CEST 2020


Fixes #491

Signed-off-by: Martin Doucha <mdoucha@suse.cz>
---

This test scenario has some potential to cause false positives if the send
buffer size changes to unsigned type in kernel.

 runtest/cve                                         | 1 +
 testcases/kernel/syscalls/setsockopt/setsockopt04.c | 5 +++++
 2 files changed, 6 insertions(+)

diff --git a/runtest/cve b/runtest/cve
index 629cf7035..942e5a5d7 100644
--- a/runtest/cve
+++ b/runtest/cve
@@ -13,6 +13,7 @@ cve-2016-5195 dirtyc0w
 cve-2016-7042 cve-2016-7042
 cve-2016-7117 cve-2016-7117
 cve-2016-9604 keyctl08
+cve-2016-9793 setsockopt04
 cve-2016-10044 cve-2016-10044
 cve-2017-2618 cve-2017-2618
 cve-2017-2671 cve-2017-2671
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt04.c b/testcases/kernel/syscalls/setsockopt/setsockopt04.c
index fda5c6b02..50d82346c 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt04.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt04.c
@@ -61,4 +61,9 @@ static struct tst_test test = {
 	.setup = setup,
 	.cleanup = cleanup,
 	.needs_root = 1,
+	.tags = (const struct tst_tag[]) {
+		{"linux-git", "b98b0bc8c431"},
+		{"CVE", "2016-9793"},
+		{}
+	}
 };
-- 
2.26.0



More information about the ltp mailing list