[GIT PULL] SELinux fixes for v5.17 (#1)
Paul Moore
paul at paul-moore.com
Thu Feb 3 22:30:43 UTC 2022
Linus,
One small SELinux patch to ensure that a policy structure field is
properly reset after freeing so that we don't inadvertently do a
double-free on certain error conditions. Please merge for the next
-rcX release.
As a quick FYI, I didn't catch the missing 'Cc: stable...' marking on
this patch until I was putting together this pull request, so if you
see a force-pull on this branch/tag that's why. The tag used in this
pull request is signed and the patch itself is pretty trivial but I
just wanted to mention it.
-Paul
--
The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:
Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
tags/selinux-pr-20220203
for you to fetch changes up to 186edf7e368c40d06cf727a1ad14698ea67b74ad:
selinux: fix double free of cond_list on error paths
(2022-02-02 11:02:10 -0500)
----------------------------------------------------------------
selinux/stable-5.17 PR 20220203
----------------------------------------------------------------
Vratislav Bendel (1):
selinux: fix double free of cond_list on error paths
security/selinux/ss/conditional.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
--
paul-moore.com
More information about the Linux-security-module-archive
mailing list