[GIT PULL] SELinux fixes for v5.17 (#1)

Paul Moore paul at paul-moore.com
Thu Feb 3 22:30:43 UTC 2022


Linus,

One small SELinux patch to ensure that a policy structure field is
properly reset after freeing so that we don't inadvertently do a
double-free on certain error conditions.  Please merge for the next
-rcX release.

As a quick FYI, I didn't catch the missing 'Cc: stable...' marking on
this patch until I was putting together this pull request, so if you
see a force-pull on this branch/tag that's why.  The tag used in this
pull request is signed and the patch itself is pretty trivial but I
just wanted to mention it.

-Paul

--
The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:

 Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)

are available in the Git repository at:

 git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
   tags/selinux-pr-20220203

for you to fetch changes up to 186edf7e368c40d06cf727a1ad14698ea67b74ad:

 selinux: fix double free of cond_list on error paths
   (2022-02-02 11:02:10 -0500)

----------------------------------------------------------------
selinux/stable-5.17 PR 20220203

----------------------------------------------------------------
Vratislav Bendel (1):
     selinux: fix double free of cond_list on error paths

security/selinux/ss/conditional.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)

-- 
paul-moore.com



More information about the Linux-security-module-archive mailing list