From patchwork Tue Jan 15 22:24:58 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Moore X-Patchwork-Id: 10765195 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id BEA776C5 for ; Tue, 15 Jan 2019 22:25:13 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id AABE92D14B for ; Tue, 15 Jan 2019 22:25:13 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 9C23E2D350; Tue, 15 Jan 2019 22:25:13 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 31F792D14B for ; Tue, 15 Jan 2019 22:25:13 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387903AbfAOWZM (ORCPT ); Tue, 15 Jan 2019 17:25:12 -0500 Received: from mail-lj1-f196.google.com ([209.85.208.196]:46290 "EHLO mail-lj1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387896AbfAOWZM (ORCPT ); Tue, 15 Jan 2019 17:25:12 -0500 Received: by mail-lj1-f196.google.com with SMTP id v15-v6so3709982ljh.13 for ; Tue, 15 Jan 2019 14:25:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to:cc; bh=dj6vgY3k8nkm1VUL5a+6pOxoYs5AQnkaYVo/LiOhr8w=; b=nfuZn+eS1rd+3fMpqCjf8Emmp/tKwYDpabKPfmdQg4j9a4q+AAyLiSoJ05UrPEADCK n05xC7ZHlW6095IepG436aCOsL8WJp05Ybo0i5VczLHv7e24KtTwUy1DzfXnmwxvoT7c hEgAGTbpckU5GJFVxHcwzo1XtYlIKpf3MUa0AGkl7eeBX/PAEvBqmTTKJQGcyOprRQRA 98pnXK+Ui9jbYX8C74wek5Xgxqwzj6ffr1oH8zOBunhF7R+UEUz37kc8dWog4odWWuro Qc1zTC05em2Y8JV/79oxXYbxfOLrJUhEZbyNDa/tNR92bxUPP6FIWoSPwL3air9tiU73 eztQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=dj6vgY3k8nkm1VUL5a+6pOxoYs5AQnkaYVo/LiOhr8w=; b=rZM7BTRRhrhAJ+OVW9KDRJi7+x6LyV21PZS4+3uQamxkCTWlFvSPYaQaIGwiqEO2lO dVIuZoypRtYucEJqiSrIu2WT+DwG754gcUVSbSUA085lCY0AHIxi97/78ybhWAwnqasC 2vD1T1Mo4Pc+0mX5VEYW6tN3R760UiCylEIq/WEttd9qx2/VoYjxL0TrgoG1EHd4FiD8 hHWNdxy3ev/XHGFUvgKocQmvM7F4KTwCkiygKA+sCGjSm8fP3yP7UZjljV0/PHiWIGYM /QlK29h0M8ewzHGGmAeCEvWFsla6ixYJABa7loviWwLJFQNrL+vU5RVUm/UNDfR5HlVD f9mA== X-Gm-Message-State: AJcUukdYGBRbsJR6UxamMuH8ecm/QixB3as3yQiEhVrMWRJW5dZjrwIP V8+mOS8x8qmkFhfcVi6WrW/SmvdDpm0UIMRFO+hg X-Google-Smtp-Source: ALg8bN74dTuejTuXW4vRFDT6TCNDIQJzKyHyM8eQG5uwskKP4DpCQ2pkPbRSHo6v8tGl550zEmFCy57lQI/goIX8wu4= X-Received: by 2002:a2e:834a:: with SMTP id l10-v6mr4201844ljh.42.1547591109976; Tue, 15 Jan 2019 14:25:09 -0800 (PST) MIME-Version: 1.0 From: Paul Moore Date: Tue, 15 Jan 2019 17:24:58 -0500 Message-ID: Subject: [GIT PULL] SELinux fixes for v5.0 (#1) To: Linus Torvalds Cc: selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: X-Virus-Scanned: ClamAV using ClamSMTP Hi Linus, One small patch to fix a potential NULL dereference on a failed SELinux policy load. Please pull this in for the next v5.0-rc. Thanks, -Paul --- The following changes since commit ee1a84fdfeedfd7362e9a8a8f15fedc3482ade2d: selinux: overhaul sidtab to fix bug and improve performance (2018-12-05 16:12:32 -0500) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git tags/selinux-pr-20190115 for you to fetch changes up to 5b0e7310a2a33c06edc7eb81ffc521af9b2c5610: selinux: fix GPF on invalid policy (2019-01-10 20:23:05 -0500) ---------------------------------------------------------------- selinux/stable-5.0 PR 20190115 ---------------------------------------------------------------- Stephen Smalley (1): selinux: fix GPF on invalid policy security/selinux/ss/policydb.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)