android_kernel_samsung_a7y1.../security/apparmor
Jann Horn 076e5e2ff7 apparmor: enforce nullbyte at end of tag string
commit 8404d7a674c49278607d19726e0acc0cae299357 upstream.

A packed AppArmor policy contains null-terminated tag strings that are read
by unpack_nameX(). However, unpack_nameX() uses string functions on them
without ensuring that they are actually null-terminated, potentially
leading to out-of-bounds accesses.

Make sure that the tag string is null-terminated before passing it to
strcmp().

Cc: stable@vger.kernel.org
Fixes: 736ec752d95e ("AppArmor: policy routines for loading and unpacking policy")
Signed-off-by: Jann Horn <jannh@google.com>
Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-04-06 19:16:20 +02:00
..
include A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
apparmorfs.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
audit.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
capability.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
context.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
crypto.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
domain.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
file.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
ipc.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
Kconfig A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
lib.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
lsm.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
Makefile A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
match.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
path.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
policy_unpack.c apparmor: enforce nullbyte at end of tag string 2020-04-06 19:16:20 +02:00
policy.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
procattr.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
resource.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30
sid.c A750FXXU4CTBC 2020-03-27 21:51:54 +05:30