kernel-fxtec-pro1x/security/apparmor/include
Tyler Hicks 7f3ebcf2b1 apparmor: Check buffer bounds when mapping permissions mask
Don't read past the end of the buffer containing permissions
characters or write past the end of the destination string.

Detected by CoverityScan CID#1415361, 1415376 ("Out-of-bounds access")

Fixes: e53cfe6c7c ("apparmor: rework perm mapping to a slightly broader set")
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Acked-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: John Johansen <john.johansen@canonical.com>
2018-07-19 16:24:43 -07:00
..
apparmor.h apparmor: add base infastructure for socket mediation 2018-03-13 17:25:48 -07:00
apparmorfs.h
audit.h apparmor: Add support for audit rule filtering 2018-06-07 01:50:47 -07:00
capability.h
cred.h apparmor: move context.h to cred.h 2018-02-09 11:30:01 -08:00
crypto.h
domain.h + Features 2017-09-23 05:33:29 -10:00
file.h
ipc.h
label.h apparmor: add support for mapping secids and using secctxes 2018-05-02 00:48:55 -07:00
lib.h Rename superblock flags (MS_xyz -> SB_xyz) 2017-11-27 13:05:09 -08:00
match.h apparmor: improve overlapping domain attachment resolution 2018-02-09 11:30:02 -08:00
mount.h apparmor: add mount mediation 2017-09-22 13:00:57 -07:00
net.h apparmor: add base infastructure for socket mediation 2018-03-13 17:25:48 -07:00
path.h apparmor: improve get_buffers macro by using get_cpu_ptr 2018-06-07 01:49:21 -07:00
perms.h apparmor: Check buffer bounds when mapping permissions mask 2018-07-19 16:24:43 -07:00
policy.h apparmor: remove POLICY_MEDIATES_SAFE 2018-03-13 17:25:49 -07:00
policy_ns.h
policy_unpack.h apparmor: split load data into management struct and data blob 2018-02-09 11:30:00 -08:00
procattr.h
resource.h
secid.h apparmor: fixup secid map conversion to using IDR 2018-06-07 01:50:49 -07:00
sig_names.h apparmor: audit unknown signal numbers 2018-02-09 11:30:01 -08:00
task.h apparmor: update domain transitions that are subsets of confinement at nnp 2018-02-09 11:30:01 -08:00