a280b89982
The patch below fixes a problem in the iptables SECMARK target, where the user-supplied 'selctx' string may not be nul-terminated. From initial analysis, it seems that the strlen() called from selinux_string_to_sid() could run until it arbitrarily finds a zero, and possibly cause a kernel oops before then. The impact of this appears limited because the operation requires CAP_NET_ADMIN, which is essentially always root. Also, the module is not yet in wide use. Signed-off-by: James Morris <jmorris@namei.org> Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Signed-off-by: David S. Miller <davem@davemloft.net> |
||
---|---|---|
.. | ||
core.c | ||
Kconfig | ||
Makefile | ||
nf_conntrack_core.c | ||
nf_conntrack_ftp.c | ||
nf_conntrack_l3proto_generic.c | ||
nf_conntrack_netlink.c | ||
nf_conntrack_proto_generic.c | ||
nf_conntrack_proto_sctp.c | ||
nf_conntrack_proto_tcp.c | ||
nf_conntrack_proto_udp.c | ||
nf_conntrack_standalone.c | ||
nf_internals.h | ||
nf_log.c | ||
nf_queue.c | ||
nf_sockopt.c | ||
nfnetlink_log.c | ||
nfnetlink_queue.c | ||
nfnetlink.c | ||
x_tables.c | ||
xt_CLASSIFY.c | ||
xt_comment.c | ||
xt_connbytes.c | ||
xt_connmark.c | ||
xt_CONNMARK.c | ||
xt_CONNSECMARK.c | ||
xt_conntrack.c | ||
xt_dccp.c | ||
xt_esp.c | ||
xt_helper.c | ||
xt_length.c | ||
xt_limit.c | ||
xt_mac.c | ||
xt_mark.c | ||
xt_MARK.c | ||
xt_multiport.c | ||
xt_NFQUEUE.c | ||
xt_NOTRACK.c | ||
xt_physdev.c | ||
xt_pkttype.c | ||
xt_policy.c | ||
xt_quota.c | ||
xt_realm.c | ||
xt_sctp.c | ||
xt_SECMARK.c | ||
xt_state.c | ||
xt_statistic.c | ||
xt_string.c | ||
xt_tcpmss.c | ||
xt_tcpudp.c |