<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security, branch v2.6.14.4</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security?h=v2.6.14.4</id>
<link rel='self' href='https://git.amat.us/linux/atom/security?h=v2.6.14.4'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2005-10-23T23:38:39Z</updated>
<entry>
<title>[PATCH] SELinux: handle sel_make_bools() failure in selinuxfs</title>
<updated>2005-10-23T23:38:39Z</updated>
<author>
<name>Davi Arnaut</name>
<email>davi.arnaut@gmail.com</email>
</author>
<published>2005-10-23T19:57:16Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=20c19e4179884d7e843314071e2dfb1ea7b0afcd'/>
<id>urn:sha1:20c19e4179884d7e843314071e2dfb1ea7b0afcd</id>
<content type='text'>
This patch fixes error handling in sel_make_bools(), where currently we'd
get a memory leak via security_get_bools() and try to kfree() the wrong
pointer if called again.

Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Acked-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] selinux: Fix NULL deref in policydb_destroy</title>
<updated>2005-10-23T23:38:38Z</updated>
<author>
<name>Stephen Smalley</name>
<email>sds@tycho.nsa.gov</email>
</author>
<published>2005-10-23T19:57:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=282c1f5eba150d0b156ffa9e6b064f1d92f8315f'/>
<id>urn:sha1:282c1f5eba150d0b156ffa9e6b064f1d92f8315f</id>
<content type='text'>
This patch fixes a possible NULL dereference in policydb_destroy, where
p-&gt;type_attr_map can be NULL if policydb_destroy is called to clean up a
partially loaded policy upon an error during policy load.  Please apply.

Signed-off-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keys: Possessor permissions should be additive</title>
<updated>2005-10-08T21:54:48Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-10-07T15:41:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7ab501db8cb6659efdf04034e0de6b44c059a51b'/>
<id>urn:sha1:7ab501db8cb6659efdf04034e0de6b44c059a51b</id>
<content type='text'>
This patch makes the possessor permissions on a key additive with
user/group/other permissions on the same key.

This permits extra rights to be granted to the possessor of a key without
taking away any rights conferred by them owning the key or having common group
membership.

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keys: Split key permissions checking into a .c file</title>
<updated>2005-10-08T21:53:31Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-10-07T14:07:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=468ed2b0c85ec4310b429e60358213b6d077289e'/>
<id>urn:sha1:468ed2b0c85ec4310b429e60358213b6d077289e</id>
<content type='text'>
The attached patch splits key permissions checking out of key-ui.h and
moves it into a .c file.  It's quite large and called quite a lot, and
it's about to get bigger with the addition of LSM support for keys...

key_any_permission() is also discarded as it's no longer used.

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keys: Add request-key process documentation</title>
<updated>2005-10-08T21:53:31Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-10-07T14:04:52Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f1a9badcf6ecad9975240d94514721cb93932151'/>
<id>urn:sha1:f1a9badcf6ecad9975240d94514721cb93932151</id>
<content type='text'>
The attached patch adds documentation for the process by which request-key
works, including how it permits helper processes to gain access to the
requestor's keyrings.

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] key: plug request_key_auth memleak</title>
<updated>2005-10-08T21:53:31Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-10-07T14:01:09Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=74fd92c511bd4a0771ac0faaaef38bb1be3a29f6'/>
<id>urn:sha1:74fd92c511bd4a0771ac0faaaef38bb1be3a29f6</id>
<content type='text'>
Plug request_key_auth memleak.  This can be triggered by unprivileged
users, so is local DoS.

Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] SELinux - fix SCTP socket bug and general IP protocol handling</title>
<updated>2005-09-30T18:36:04Z</updated>
<author>
<name>James Morris</name>
<email>jmorris@namei.org</email>
</author>
<published>2005-09-30T18:24:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=13402580021a52e49c6d1068ff28ade4d5a175f1'/>
<id>urn:sha1:13402580021a52e49c6d1068ff28ade4d5a175f1</id>
<content type='text'>
The following patch updates the way SELinux classifies and handles IP
based protocols.

Currently, IP sockets are classified by SELinux as being either TCP, UDP
or 'Raw', the latter being a default for IP socket that is not TCP or UDP.

The classification code is out of date and uses only the socket type
parameter to socket(2) to determine the class of IP socket.  So, any
socket created with SOCK_STREAM will be classified by SELinux as TCP, and
SOCK_DGRAM as UDP.  Also, other socket types such as SOCK_SEQPACKET and
SOCK_DCCP are currently ignored by SELinux, which classifies them as
generic sockets, which means they don't even get basic IP level checking.

This patch changes the SELinux IP socket classification logic, so that
only an IPPROTO_IP protocol value passed to socket(2) classify the socket
as TCP or UDP.  The patch also drops the check for SOCK_RAW and converts
it into a default, so that socket types like SOCK_DCCP and SOCK_SEQPACKET
are classified as SECCLASS_RAWIP_SOCKET (instead of generic sockets).

Note that protocol-specific support for SCTP, DCCP etc. is not addressed
here, we're just getting these protocols checked at the IP layer.

This fixes a reported problem where SCTP sockets were being recognized as
generic SELinux sockets yet still being passed in one case to an IP level
check, which then fails for generic sockets.

It will also fix bugs where any SOCK_STREAM socket is classified as TCP or
any SOCK_DGRAM socket is classified as UDP.

This patch also unifies the way IP sockets classes are determined in
selinux_socket_bind(), so we use the already calculated value instead of
trying to recalculate it.

Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keys: Add possessor permissions to keys [try #3]</title>
<updated>2005-09-28T16:10:47Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-09-28T16:03:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=664cceb0093b755739e56572b836a99104ee8a75'/>
<id>urn:sha1:664cceb0093b755739e56572b836a99104ee8a75</id>
<content type='text'>
The attached patch adds extra permission grants to keys for the possessor of a
key in addition to the owner, group and other permissions bits. This makes
SUID binaries easier to support without going as far as labelling keys and key
targets using the LSM facilities.

This patch adds a second "pointer type" to key structures (struct key_ref *)
that can have the bottom bit of the address set to indicate the possession of
a key. This is propagated through searches from the keyring to the discovered
key. It has been made a separate type so that the compiler can spot attempts
to dereference a potentially incorrect pointer.

The "possession" attribute can't be attached to a key structure directly as
it's not an intrinsic property of a key.

Pointers to keys have been replaced with struct key_ref *'s wherever
possession information needs to be passed through.

This does assume that the bottom bit of the pointer will always be zero on
return from kmem_cache_alloc().

The key reference type has been made into a typedef so that at least it can be
located in the sources, even though it's basically a pointer to an undefined
type. I've also renamed the accessor functions to be more useful, and all
reference variables should now end in "_ref".

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] seclvl: use securityfs (fix)</title>
<updated>2005-09-17T18:50:01Z</updated>
<author>
<name>Serge Hallyn</name>
<email>serue@us.ibm.com</email>
</author>
<published>2005-09-17T02:27:57Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9afa57b04ca08ff061e54787e3becf5c40283149'/>
<id>urn:sha1:9afa57b04ca08ff061e54787e3becf5c40283149</id>
<content type='text'>
That should be -EINVAL for both.

Signed-off-by: Serge Hallyn &lt;serue@us.ibm.com&gt;
Cc: Greg KH &lt;greg@kroah.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] seclvl-use-securityfs tidy</title>
<updated>2005-09-17T18:50:01Z</updated>
<author>
<name>Andrew Morton</name>
<email>akpm@osdl.org</email>
</author>
<published>2005-09-17T02:27:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d15c5749eb81dee94d40fe12584ca8461858b4cb'/>
<id>urn:sha1:d15c5749eb81dee94d40fe12584ca8461858b4cb</id>
<content type='text'>
We don't put braces around single statements, thanks.

Cc: Serge Hallyn &lt;serue@us.ibm.com&gt;
Cc: James Morris &lt;jmorris@namei.org&gt;
Cc: Chris Wright &lt;chrisw@osdl.org&gt;
Cc: Greg KH &lt;greg@kroah.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
</feed>
