<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux-toradex.git/security, branch v2.6.23.12</title>
<subtitle>Linux kernel for Apalis and Colibri modules</subtitle>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/'/>
<entry>
<title>SELinux: fix array out of bounds when mounting with selinux options</title>
<updated>2007-09-19T22:06:40+00:00</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2007-09-19T21:19:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=31e879309474d1666d645b96de99d0b682fa055f'/>
<id>31e879309474d1666d645b96de99d0b682fa055f</id>
<content type='text'>
Given an illegal selinux option it was possible for match_token to work in
random memory at the end of the match_table_t array.

Note that privilege is required to perform a context mount, so this issue is
effectively limited to root only.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Acked-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Given an illegal selinux option it was possible for match_token to work in
random memory at the end of the match_table_t array.

Note that privilege is required to perform a context mount, so this issue is
effectively limited to root only.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Acked-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: clear parent death signal on SID transitions</title>
<updated>2007-08-31T00:22:47+00:00</updated>
<author>
<name>Stephen Smalley</name>
<email>sds@tycho.nsa.gov</email>
</author>
<published>2007-08-29T12:51:50+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=4ac212ad4e8fafc22fa147fc255ff5fa5435cf33'/>
<id>4ac212ad4e8fafc22fa147fc255ff5fa5435cf33</id>
<content type='text'>
Clear parent death signal on SID transitions to prevent unauthorized
signaling between SIDs.

Signed-off-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Acked-by: Eric Paris &lt;eparis@parisplace.org&gt;
Signed-off-by: James Morris &lt;jmorris@localhost.localdomain&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Clear parent death signal on SID transitions to prevent unauthorized
signaling between SIDs.

Signed-off-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Acked-by: Eric Paris &lt;eparis@parisplace.org&gt;
Signed-off-by: James Morris &lt;jmorris@localhost.localdomain&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>fix NULL pointer dereference in __vm_enough_memory()</title>
<updated>2007-08-23T02:52:45+00:00</updated>
<author>
<name>Alan Cox</name>
<email>alan@lxorguk.ukuu.org.uk</email>
</author>
<published>2007-08-22T21:01:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=34b4e4aa3c470ce8fa2bd78abb1741b4b58baad7'/>
<id>34b4e4aa3c470ce8fa2bd78abb1741b4b58baad7</id>
<content type='text'>
The new exec code inserts an accounted vma into an mm struct which is not
current-&gt;mm.  The existing memory check code has a hard coded assumption
that this does not happen as does the security code.

As the correct mm is known we pass the mm to the security method and the
helper function.  A new security test is added for the case where we need
to pass the mm and the existing one is modified to pass current-&gt;mm to
avoid the need to change large amounts of code.

(Thanks to Tobias for fixing rejects and testing)

Signed-off-by: Alan Cox &lt;alan@redhat.com&gt;
Cc: WU Fengguang &lt;wfg@mail.ustc.edu.cn&gt;
Cc: James Morris &lt;jmorris@redhat.com&gt;
Cc: Tobias Diedrich &lt;ranma+kernel@tdiedrich.de&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The new exec code inserts an accounted vma into an mm struct which is not
current-&gt;mm.  The existing memory check code has a hard coded assumption
that this does not happen as does the security code.

As the correct mm is known we pass the mm to the security method and the
helper function.  A new security test is added for the case where we need
to pass the mm and the existing one is modified to pass current-&gt;mm to
avoid the need to change large amounts of code.

(Thanks to Tobias for fixing rejects and testing)

Signed-off-by: Alan Cox &lt;alan@redhat.com&gt;
Cc: WU Fengguang &lt;wfg@mail.ustc.edu.cn&gt;
Cc: James Morris &lt;jmorris@redhat.com&gt;
Cc: Tobias Diedrich &lt;ranma+kernel@tdiedrich.de&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: correct error code in selinux_audit_rule_init</title>
<updated>2007-08-16T15:42:28+00:00</updated>
<author>
<name>Steve G</name>
<email>linux_4ever@yahoo.com</email>
</author>
<published>2007-08-14T19:50:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=3ad40d647d5e7c320385649e5eb422a5e89e035d'/>
<id>3ad40d647d5e7c320385649e5eb422a5e89e035d</id>
<content type='text'>
Corrects an error code so that it is valid to pass to userspace.

Signed-off-by: Steve Grubb &lt;linux_4ever@yahoo.com&gt;
Signed-off-by: James Morris &lt;jmorris@halo.namei&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Corrects an error code so that it is valid to pass to userspace.

Signed-off-by: Steve Grubb &lt;linux_4ever@yahoo.com&gt;
Signed-off-by: James Morris &lt;jmorris@halo.namei&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: remove redundant pointer checks before calling kfree()</title>
<updated>2007-08-02T15:52:23+00:00</updated>
<author>
<name>Paul Moore</name>
<email>paul.moore@hp.com</email>
</author>
<published>2007-08-01T15:12:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=088999e98b8caecd31adc3b62223a228555c5ab7'/>
<id>088999e98b8caecd31adc3b62223a228555c5ab7</id>
<content type='text'>
We don't need to check for NULL pointers before calling kfree().

Signed-off-by: Paul Moore &lt;paul.moore@hp.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We don't need to check for NULL pointers before calling kfree().

Signed-off-by: Paul Moore &lt;paul.moore@hp.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: restore proper NetLabel caching behavior</title>
<updated>2007-08-02T15:52:21+00:00</updated>
<author>
<name>Paul Moore</name>
<email>paul.moore@hp.com</email>
</author>
<published>2007-07-30T20:33:26+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=9534f71ca33e5a9de26dfd43c76af86e005005dd'/>
<id>9534f71ca33e5a9de26dfd43c76af86e005005dd</id>
<content type='text'>
A small fix to the SELinux/NetLabel glue code to ensure that the NetLabel
cache is utilized when possible.  This was broken when the SELinux/NetLabel
glue code was reorganized in the last kernel release.

Signed-off-by: Paul Moore &lt;paul.moore@hp.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
A small fix to the SELinux/NetLabel glue code to ensure that the NetLabel
cache is utilized when possible.  This was broken when the SELinux/NetLabel
glue code was reorganized in the last kernel release.

Signed-off-by: Paul Moore &lt;paul.moore@hp.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Typo fixes errror -&gt; error</title>
<updated>2007-07-31T22:39:42+00:00</updated>
<author>
<name>Gabriel Craciunescu</name>
<email>nix.or.die@googlemail.com</email>
</author>
<published>2007-07-31T07:39:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=d133a9609ee6111c9718a4bbe559b84a399603e6'/>
<id>d133a9609ee6111c9718a4bbe559b84a399603e6</id>
<content type='text'>
Typo fixes errror -&gt; error

Signed-off-by: Gabriel Craciunescu &lt;nix.or.die@googlemail.com&gt;
Cc: Jeff Garzik &lt;jeff@garzik.org&gt;
Cc: Martin Schwidefsky &lt;schwidefsky@de.ibm.com&gt;
Cc: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Typo fixes errror -&gt; error

Signed-off-by: Gabriel Craciunescu &lt;nix.or.die@googlemail.com&gt;
Cc: Jeff Garzik &lt;jeff@garzik.org&gt;
Cc: Martin Schwidefsky &lt;schwidefsky@de.ibm.com&gt;
Cc: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: null-terminate context string in selinux_xfrm_sec_ctx_alloc</title>
<updated>2007-07-25T16:49:41+00:00</updated>
<author>
<name>Venkat Yekkirala</name>
<email>vyekkirala@trustedcs.com</email>
</author>
<published>2007-07-24T14:53:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=910949a66839ff5f59fede5b7cb68ecf1453e22c'/>
<id>910949a66839ff5f59fede5b7cb68ecf1453e22c</id>
<content type='text'>
xfrm_audit_log() expects the context string to be null-terminated
which currently doesn't happen with user-supplied contexts.

Signed-off-by: Venkat Yekkirala &lt;vyekkirala@TrustedCS.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
xfrm_audit_log() expects the context string to be null-terminated
which currently doesn't happen with user-supplied contexts.

Signed-off-by: Venkat Yekkirala &lt;vyekkirala@TrustedCS.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: fix memory leak in security_netlbl_cache_add()</title>
<updated>2007-07-23T13:35:37+00:00</updated>
<author>
<name>Jesper Juhl</name>
<email>jesper.juhl@gmail.com</email>
</author>
<published>2007-07-20T22:12:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=0ec8abd7086ee4f760cb1b477fe376805b17558c'/>
<id>0ec8abd7086ee4f760cb1b477fe376805b17558c</id>
<content type='text'>
Fix memory leak in security_netlbl_cache_add()
Note: The Coverity checker gets credit for spotting this one.

Signed-off-by: Jesper Juhl &lt;jesper.juhl@gmail.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix memory leak in security_netlbl_cache_add()
Note: The Coverity checker gets credit for spotting this one.

Signed-off-by: Jesper Juhl &lt;jesper.juhl@gmail.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>[PATCH] get rid of AVC_PATH postponed treatment</title>
<updated>2007-07-22T13:57:02+00:00</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2007-06-07T15:13:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=4259fa01a2d2aa3e589b34ba7624080232d9c1ff'/>
<id>4259fa01a2d2aa3e589b34ba7624080232d9c1ff</id>
<content type='text'>
        Selinux folks had been complaining about the lack of AVC_PATH
records when audit is disabled.  I must admit my stupidity - I assumed
that avc_audit() really couldn't use audit_log_d_path() because of
deadlocks (== could be called with dcache_lock or vfsmount_lock held).
Shouldn't have made that assumption - it never gets called that way.
It _is_ called under spinlocks, but not those.

        Since audit_log_d_path() uses ab-&gt;gfp_mask for allocations,
kmalloc() in there is not a problem.  IOW, the simple fix is sufficient:
let's rip AUDIT_AVC_PATH out and simply generate pathname as part of main
record.  It's trivial to do.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
        Selinux folks had been complaining about the lack of AVC_PATH
records when audit is disabled.  I must admit my stupidity - I assumed
that avc_audit() really couldn't use audit_log_d_path() because of
deadlocks (== could be called with dcache_lock or vfsmount_lock held).
Shouldn't have made that assumption - it never gets called that way.
It _is_ called under spinlocks, but not those.

        Since audit_log_d_path() uses ab-&gt;gfp_mask for allocations,
kmalloc() in there is not a problem.  IOW, the simple fix is sufficient:
let's rip AUDIT_AVC_PATH out and simply generate pathname as part of main
record.  It's trivial to do.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
</pre>
</div>
</content>
</entry>
</feed>
