Searched hist:"5 f8ac64b" (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/security/selinux/ |
H A D | xfrm.c | 5f8ac64b Fri Jan 06 15:22:39 CST 2006 Trent Jaeger <tjaeger@cse.psu.edu> [LSM-IPSec]: Corrections to LSM-IPSec Nethooks
This patch contains two corrections to the LSM-IPsec Nethooks patches previously applied.
(1) free a security context on a failed insert via xfrm_user interface in xfrm_add_policy. Memory leak.
(2) change the authorization of the allocation of a security context in a xfrm_policy or xfrm_state from both relabelfrom and relabelto to setcontext.
Signed-off-by: Trent Jaeger <tjaeger@cse.psu.edu> Signed-off-by: David S. Miller <davem@davemloft.net> 5f8ac64b Fri Jan 06 15:22:39 CST 2006 Trent Jaeger <tjaeger@cse.psu.edu> [LSM-IPSec]: Corrections to LSM-IPSec Nethooks This patch contains two corrections to the LSM-IPsec Nethooks patches previously applied. (1) free a security context on a failed insert via xfrm_user interface in xfrm_add_policy. Memory leak. (2) change the authorization of the allocation of a security context in a xfrm_policy or xfrm_state from both relabelfrom and relabelto to setcontext. Signed-off-by: Trent Jaeger <tjaeger@cse.psu.edu> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/xfrm/ |
H A D | xfrm_user.c | 5f8ac64b Fri Jan 06 15:22:39 CST 2006 Trent Jaeger <tjaeger@cse.psu.edu> [LSM-IPSec]: Corrections to LSM-IPSec Nethooks
This patch contains two corrections to the LSM-IPsec Nethooks patches previously applied.
(1) free a security context on a failed insert via xfrm_user interface in xfrm_add_policy. Memory leak.
(2) change the authorization of the allocation of a security context in a xfrm_policy or xfrm_state from both relabelfrom and relabelto to setcontext.
Signed-off-by: Trent Jaeger <tjaeger@cse.psu.edu> Signed-off-by: David S. Miller <davem@davemloft.net> 5f8ac64b Fri Jan 06 15:22:39 CST 2006 Trent Jaeger <tjaeger@cse.psu.edu> [LSM-IPSec]: Corrections to LSM-IPSec Nethooks This patch contains two corrections to the LSM-IPsec Nethooks patches previously applied. (1) free a security context on a failed insert via xfrm_user interface in xfrm_add_policy. Memory leak. (2) change the authorization of the allocation of a security context in a xfrm_policy or xfrm_state from both relabelfrom and relabelto to setcontext. Signed-off-by: Trent Jaeger <tjaeger@cse.psu.edu> Signed-off-by: David S. Miller <davem@davemloft.net>
|