[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-id: <cover.1414494901.git.d.kasatkin@samsung.com>
Date: Tue, 28 Oct 2014 13:31:21 +0200
From: Dmitry Kasatkin <d.kasatkin@...sung.com>
To: zohar@...ux.vnet.ibm.com, linux-security-module@...r.kernel.org,
linux-ima-devel@...ts.sourceforge.net
Cc: linux-kernel@...r.kernel.org, jack@...e.cz, jmorris@...ei.org,
dmitry.kasatkin@...il.com, Dmitry Kasatkin <d.kasatkin@...sung.com>
Subject: [PATCH v3 0/3] integrity: NULL pointer dereference fixes
Hi,
Recently Jan Kara reported about possible NULL pointer dereference
in IMA and EVM setxattr hooks. This patchset fixes the problem.
http://sourceforge.net/p/linux-ima/mailman/message/32957578
In this version of the patchset we agreed with Mimi to split IMA
patch into two, where the first patch fixes the oops and must go to
the stable and the second patch limits setting of file hash to fix
and log modes and may go to the next kernel version via normal process.
- Dmitry
Dmitry Kasatkin (3):
ima: check xattr value length and type in the ima_inode_setxattr()
ima: limit file hash setting by user to fix and log modes
evm: check xattr value length and type in evm_inode_setxattr()
security/integrity/evm/evm_main.c | 11 ++++++++---
security/integrity/ima/ima_appraise.c | 10 ++++++++--
security/integrity/integrity.h | 1 +
3 files changed, 17 insertions(+), 5 deletions(-)
--
1.9.1
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists