linux-stable/security
Roberto Sassu 8ff12bd997 smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity()
[ Upstream commit ac02f007d6 ]

If the SMACK64TRANSMUTE xattr is provided, and the inode is a directory,
update the in-memory inode flags by setting SMK_INODE_TRANSMUTE.

Cc: stable@vger.kernel.org
Fixes: 5c6d1125f8 ("Smack: Transmute labels on specified directories") # v2.6.38.x
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-04-13 12:50:03 +02:00
..
apparmor apparmor: avoid crash when parsed profile name is empty 2024-01-25 14:33:38 -08:00
integrity ima: detect changes to the backing overlay file 2023-12-08 08:43:26 +01:00
keys security: keys: perform capable check only on privileged operations 2023-09-23 10:47:58 +02:00
loadpin
selinux lsm: new security_file_ioctl_compat() hook 2024-02-23 08:12:58 +01:00
smack smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity() 2024-04-13 12:50:03 +02:00
tomoyo lsm: new security_file_ioctl_compat() hook 2024-02-23 08:12:58 +01:00
yama Yama: Check for pid death before checking ancestry 2019-01-22 21:40:32 +01:00
Kconfig fortify: Explicitly disable Clang support 2021-11-26 11:36:18 +01:00
Makefile
commoncap.c capabilities: fix potential memleak on error path from vfs_getxattr_alloc() 2022-11-10 17:46:55 +01:00
device_cgroup.c device_cgroup: Roll back to original exceptions after copy failure 2023-01-18 11:30:44 +01:00
inode.c securityfs: fix use-after-free on symlink traversal 2019-05-25 18:23:42 +02:00
lsm_audit.c dump_common_audit_data(): fix racy accesses to ->d_name 2021-01-19 18:22:37 +01:00
min_addr.c
security.c lsm: new security_file_ioctl_compat() hook 2024-02-23 08:12:58 +01:00