[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHC9VhQJ8oDqX09AdrvLJAgweaBcxETCw547CSiRyApRguXznQ@mail.gmail.com>
Date: Fri, 26 Jul 2019 18:13:53 -0400
From: Paul Moore <paul@...l-moore.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: selinux@...r.kernel.org, linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: [GIT PULL] SELinux fixes for v5.3 (#1)
Hi Linus,
One small SELinux patch to add some proper bounds/overflow checking
when adding a new sid/secid. Please merge for v5.3.
Thanks,
-Paul
--
The following changes since commit ea74a685ad819aeed316a9bae3d2a5bf762da82d:
selinux: format all invalid context as untrusted
(2019-07-01 16:29:05 -0400)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
tags/selinux-pr-20190726
for you to fetch changes up to acbc372e6109c803cbee4733769d02008381740f:
selinux: check sidtab limit before adding a new entry
(2019-07-24 11:13:34 -0400)
----------------------------------------------------------------
selinux/stable-5.3 PR 20190726
----------------------------------------------------------------
Ondrej Mosnacek (1):
selinux: check sidtab limit before adding a new entry
security/selinux/ss/sidtab.c | 5 +++++
1 file changed, 5 insertions(+)
--
paul moore
www.paul-moore.com
Powered by blists - more mailing lists