[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHC9VhQHW1UOfu5wDOnNHwTK7FF4SyTx1OCBd9o6izB+69H9EQ@mail.gmail.com>
Date: Wed, 23 Feb 2022 16:20:33 -0500
From: Paul Moore <paul@...l-moore.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: selinux@...r.kernel.org, linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: [GIT PULL] SELinux fixes for v5.17 (#2)
Linus,
A second small SELinux fix for v5.17-rcX which addresses an incorrect
mutex_is_locked() check; the commit description provides more detail
if desired. Please merge for the next -rcX release, thanks.
-Paul
--
The following changes since commit 186edf7e368c40d06cf727a1ad14698ea67b74ad:
selinux: fix double free of cond_list on error paths
(2022-02-02 11:02:10 -0500)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
tags/selinux-pr-20220223
for you to fetch changes up to ce2fc710c9d2b25afc710f49bb2065b4439a62bc:
selinux: fix misuse of mutex_is_locked() (2022-02-22 18:02:58 -0500)
----------------------------------------------------------------
selinux/stable-5.17 PR 20220223
----------------------------------------------------------------
Ondrej Mosnacek (1):
selinux: fix misuse of mutex_is_locked()
security/selinux/ima.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--
paul-moore.com
Powered by blists - more mailing lists