From patchwork Tue Nov 23 21:52:30 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Moore X-Patchwork-Id: 12635513 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id CB196C433EF for ; Tue, 23 Nov 2021 21:52:44 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236421AbhKWVzw (ORCPT ); Tue, 23 Nov 2021 16:55:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53566 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236073AbhKWVzv (ORCPT ); Tue, 23 Nov 2021 16:55:51 -0500 Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com [IPv6:2a00:1450:4864:20::52e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CFE6CC061574 for ; Tue, 23 Nov 2021 13:52:42 -0800 (PST) Received: by mail-ed1-x52e.google.com with SMTP id t5so1280614edd.0 for ; Tue, 23 Nov 2021 13:52:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=mime-version:from:date:message-id:subject:to:cc; bh=zFcNkIoq5muaZLvXLLeD4MHIH39egtBeCwO9IdlTd4E=; b=OUP1+BWbRR1b3WBE5EPf7wawaImps7sZtcKoV3aIlzMbRSpLTdQG3C6V5eAUdnQz/9 2CN3GYtDOAcZGPN1DWHeKieWuvM6fsscrVPn1tpZheCvVPW62pegPbUdk8zxulX8OHE3 ++cSeYIku3cn92qeP43g0JPUX1hlMW9eNNBuGCkMbpL4fTsUVUIf/j+21Kynbiml+gOP aDrfpp7FPHb3uc82Jz5aNyhzzm9/HP8WzBu6Dd6KXdneq3I6P68VNltjQQj2x1pc7eb2 M7DsZ6O1IehRqJkYGU7CbSejCoRh0AdUJGhOGDZmp0c2BO7n69Szl8W8vzlj8XfTpIdk 9fmQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=zFcNkIoq5muaZLvXLLeD4MHIH39egtBeCwO9IdlTd4E=; b=AtSI8GNNDNedrur89KoJi3ourcKtJUzftvjz3qGC+SCl4W43bk5eXXLsolyJTdaDjE o3g45jWvVYjfQzdVIAm/9KWTzMC/TLVDAa/2bMNUy0mf/a+a0UU5vHvphyUpIWjwTS2j 3yvwXOxe2zawbEJDc6O+/rjHEp9AkBl1pEfMagqsbNQHLagWQgAtK1Vu5mUwl/dSLZPa jvZ05bBjPBjh8QxutostnhQHtgvM3EFeeWQUZ8GiCNEN1y/bF07lygjBCiWstjeUlcLp Qdnv6BlH5KD5wpP+WTAXSyugextl8NHZPB2uU8aA0sWeTG6paNFYEsoet8rQQYMQ4/hw 1RYg== X-Gm-Message-State: AOAM533BIOraPr5lsAhAR7wLBKoiiKXpVei3l9HXrDPTIcnoz1FCvi6M 878ioZhElsAzCtHvw33XZLNaErahLMs6s6Wqefu9 X-Google-Smtp-Source: ABdhPJwTLLnHLhScwB6svIWfEht4EV8Tpcy6SZUmpF3lSj+DYO8/zQWjYkw6wj7xPdoCdQ5T73OqDVj5c5I9dtLs4KQ= X-Received: by 2002:a17:907:868f:: with SMTP id qa15mr12283769ejc.187.1637704361326; Tue, 23 Nov 2021 13:52:41 -0800 (PST) MIME-Version: 1.0 From: Paul Moore Date: Tue, 23 Nov 2021 16:52:30 -0500 Message-ID: Subject: [GIT PULL] SELinux fixes for v5.16 (#2) To: Linus Torvalds Cc: selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: Hi Linus, A small SELinux fix for v5.16. As usual the commit description has more detail, but it's basically a fix to make sure things are handled correctly when an allocation fails; please merge. Thanks, -Paul --- The following changes since commit 32a370abf12f82c8383e430c21365f5355d8b288: net,lsm,selinux: revert the security_sctp_assoc_established() hook (2021-11-12 12:07:02 -0500) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git tags/selinux-pr-20211123 for you to fetch changes up to dc27f3c5d10c58069672215787a96b4fae01818b: selinux: fix NULL-pointer dereference when hashtab allocation fails (2021-11-19 16:11:39 -0500) ---------------------------------------------------------------- selinux/stable-5.16 PR 20211123 ---------------------------------------------------------------- Ondrej Mosnacek (1): selinux: fix NULL-pointer dereference when hashtab allocation fails security/selinux/ss/hashtab.c | 17 ++++++++++++----- 1 file changed, 12 insertions(+), 5 deletions(-)