android_kernel_samsung_a7y1.../security
Jann Horn d0ad8e6fff apparmor: enforce nullbyte at end of tag string
commit 8404d7a674c49278607d19726e0acc0cae299357 upstream.

A packed AppArmor policy contains null-terminated tag strings that are read
by unpack_nameX(). However, unpack_nameX() uses string functions on them
without ensuring that they are actually null-terminated, potentially
leading to out-of-bounds accesses.

Make sure that the tag string is null-terminated before passing it to
strcmp().

Cc: stable@vger.kernel.org
Fixes: 736ec752d95e ("AppArmor: policy routines for loading and unpacking policy")
Signed-off-by: Jann Horn <jannh@google.com>
Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2023-04-10 21:33:09 +02:00
..
apparmor apparmor: enforce nullbyte at end of tag string 2023-04-10 21:33:09 +02:00
defex_lsm A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
dsms A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
integrity A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
keys A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
mstdrv A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
proca A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
samsung A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
sdp A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
selinux A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
smack A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
tima_uevent A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
tomoyo A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
tz_iccc A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
yama A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
commoncap.c A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
device_cgroup.c A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
inode.c A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
Kconfig A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
lsm_audit.c A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
Makefile A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
min_addr.c A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00
security.c A750FNXXU4CTG1 2023-04-07 21:05:06 +02:00