[Patch 0/14] [Xenial] misc fixes for apparmor
John Johansen
john.johansen at canonical.com
Wed Feb 1 09:05:52 UTC 2017
The following patch sequence fixes various out bugs in apparmor in
xenial.
The patch sequence is also available via the following pull request
---
The following changes since commit a3064a277ba7e96a6b0e6bc4f38ad5036f26478b:
UBUNTU: Ubuntu-4.4.0-59.80 (2017-01-05 12:46:52 -0600)
are available in the git repository at:
git://kernel.ubuntu.com/jj/ubuntu-xenial.git
for you to fetch changes up to 1faaefb7c36c762cdbe493c399fd95a7e1488d44:
UBUNTU: SAUCE: apparmor: flock mediation is not being enforced on cache check (2017-01-31 23:21:48 -0800)
----------------------------------------------------------------
John Johansen (14):
UBUNTU: SAUCE: apparmor: fix cross ns perm of unix domain sockets
UBUNTU: SAUCE: apparmor: fix replacement race in reading rawdata
UBUNTU: SAUCE: apparmor: fix reference count bug in label_merge_insert()
UBUNTU: SAUCE: apparmor: fix label leak when new label is unused
UBUNTU: SAUCE: apparmor: Don't audit denied access of special apparmor .null file
UBUNTU: SAUCE: apparmor: fix oops in bind_mnt when dev_path lookup fails
UBUNTU: SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails
UBUNTU: SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode() fails
UBUNTU: SAUCE: apparmor: fix leak on securityfs pin count
UBUNTU: SAUCE: apparmor: fix lock ordering for mkdir
UBUNTU: SAUCE: apparmor: Fix no_new_privs blocking change_onexec when using stacked namespaces
UBUNTU: SAUCE: apparmor: fix ns ref count link when removing profiles from policy
UBUNTU: SAUCE: apparmor: null profiles should inherit parent control flags
UBUNTU: SAUCE: apparmor: flock mediation is not being enforced on cache check
include/linux/security.h | 5 +-
security/apparmor/af_unix.c | 2 +-
security/apparmor/apparmorfs.c | 36 +++++++++-----
security/apparmor/domain.c | 92 ++++++++++++++++++++++-------------
security/apparmor/file.c | 13 +++--
security/apparmor/include/policy_ns.h | 4 +-
security/apparmor/label.c | 24 +++++++--
security/apparmor/lsm.c | 3 ++
security/apparmor/mount.c | 1 +
security/apparmor/policy.c | 3 ++
security/apparmor/policy_ns.c | 8 +--
security/inode.c | 5 ++
12 files changed, 133 insertions(+), 63 deletions(-)
More information about the kernel-team
mailing list