ACK: [Patch 0/14] [Yakkety] misc fixes for apparmor
Brad Figg
brad.figg at canonical.com
Mon Feb 6 21:42:23 UTC 2017
On Wed, Feb 01, 2017 at 01:12:56AM -0800, John Johansen wrote:
> The following patch sequence fixes various out bugs in apparmor in
> yakkety.
>
> The patch sequence is also available via the following pull request
>
>
> The following changes since commit 54329dadde7c14dd194e58c1676be8f3b2144332:
>
> UBUNTU: Ubuntu-4.8.0-34.36 (2016-12-21 16:30:49 +0000)
>
> are available in the git repository at:
>
> git://kernel.ubuntu.com/jj/ubuntu-yakkety.git master
>
> for you to fetch changes up to 8ce7ef90c2e8476afeeb2b5c1f39ba3c6aea7891:
>
> UBUNTU: SAUCE: apparmor: flock mediation is not being enforced on cache check (2017-02-01 01:09:00 -0800)
>
> ----------------------------------------------------------------
> John Johansen (14):
> UBUNTU: SAUCE: apparmor: fix cross ns perm of unix domain sockets
> UBUNTU: SAUCE: apparmor: fix replacement race in reading rawdata
> UBUNTU: SAUCE: apparmor: fix reference count bug in label_merge_insert()
> UBUNTU: SAUCE: apparmor: fix label leak when new label is unused
> UBUNTU: SAUCE: apparmor: Don't audit denied access of special apparmor .null file
> UBUNTU: SAUCE: apparmor: fix oops in bind_mnt when dev_path lookup fails
> UBUNTU: SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails
> UBUNTU: SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode() fails
> UBUNTU: SAUCE: apparmor: fix leak on securityfs pin count
> UBUNTU: SAUCE: apparmor: fix lock ordering for mkdir
> UBUNTU: SAUCE: apparmor: Fix no_new_privs blocking change_onexec when using stacked namespaces
> UBUNTU: SAUCE: apparmor: fix ns ref count link when removing profiles from policy
> UBUNTU: SAUCE: apparmor: null profiles should inherit parent control flags
> UBUNTU: SAUCE: apparmor: flock mediation is not being enforced on cache check
>
> include/linux/security.h | 5 +-
> security/apparmor/af_unix.c | 2 +-
> security/apparmor/apparmorfs.c | 36 +++++++++-----
> security/apparmor/domain.c | 92 ++++++++++++++++++++++-------------
> security/apparmor/file.c | 13 +++--
> security/apparmor/include/policy_ns.h | 4 +-
> security/apparmor/label.c | 24 +++++++--
> security/apparmor/lsm.c | 3 ++
> security/apparmor/mount.c | 1 +
> security/apparmor/policy.c | 3 ++
> security/apparmor/policy_ns.c | 8 +--
> security/inode.c | 5 ++
> 12 files changed, 133 insertions(+), 63 deletions(-)
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
--
Brad Figg brad.figg at canonical.com http://www.canonical.com
More information about the kernel-team
mailing list