linux-stable/security/integrity/ima
Seth Forshee b4bfec7f4a security/integrity: Harden against malformed xattrs
In general the handling of IMA/EVM xattrs is good, but I found
a few locations where either the xattr size or the value of the
type field in the xattr are not checked. Add a few simple checks
to these locations to prevent malformed or malicious xattrs from
causing problems.

Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2016-11-13 22:50:11 -05:00
..
ima.h ima: include pcr for each measurement log entry 2016-06-30 01:14:21 -04:00
ima_api.c ima: change integrity cache to store measured pcr 2016-06-30 01:14:22 -04:00
ima_appraise.c security/integrity: Harden against malformed xattrs 2016-11-13 22:50:11 -05:00
ima_crypto.c ima: calculate the hash of a buffer using aynchronous hash(ahash) 2016-02-18 17:14:44 -05:00
ima_fs.c ima: fix memory leak in ima_release_policy 2016-11-13 22:50:08 -05:00
ima_init.c ima: include the reason for TPM-bypass mode 2016-11-13 22:50:09 -05:00
ima_main.c ima: use file_dentry() 2016-09-16 12:44:20 +02:00
ima_mok.c IMA: Use the the system trusted keyrings instead of .ima_mok 2016-04-11 22:49:15 +01:00
ima_policy.c ima: extend ima_get_action() to return the policy pcr 2016-06-30 01:14:20 -04:00
ima_queue.c ima: extend the measurement entry specific pcr 2016-06-30 01:14:22 -04:00
ima_template.c ima: separate 'security.ima' reading functionality from collect 2016-02-18 17:13:32 -05:00
ima_template_lib.c ima: separate 'security.ima' reading functionality from collect 2016-02-18 17:13:32 -05:00
ima_template_lib.h ima: wrap event related data to the new ima_event_data structure 2015-05-21 13:59:28 -04:00
Kconfig IMA: Use the the system trusted keyrings instead of .ima_mok 2016-04-11 22:49:15 +01:00
Makefile IMA: Use the the system trusted keyrings instead of .ima_mok 2016-04-11 22:49:15 +01:00