linux/security/smack
Ahmed S. Darwish 1d252fb870 smack: do not dereference NULL ipc object
In the SYSV ipc msgctl(),semctl(),shmctl() family, if the user passed *_INFO
as the desired operation, no specific object is meant to be controlled and
only system-wide information is returned.  This leads to a NULL IPC object in
the LSM hooks if the _INFO flag is given.

Avoid dereferencing this NULL pointer in Smack ipc *ctl() methods.

Signed-off-by: Ahmed S. Darwish <darwish.07@gmail.com>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2008-03-19 18:53:36 -07:00
..
Kconfig Smack: Simplified Mandatory Access Control Kernel 2008-02-05 09:44:20 -08:00
Makefile Smack: Simplified Mandatory Access Control Kernel 2008-02-05 09:44:20 -08:00
smack_access.c Smack: Simplified Mandatory Access Control Kernel 2008-02-05 09:44:20 -08:00
smack_lsm.c smack: do not dereference NULL ipc object 2008-03-19 18:53:36 -07:00
smack.h smackfs: do not trust `count' in inodes write()s 2008-03-13 13:11:43 -07:00
smackfs.c smackfs: do not trust `count' in inodes write()s 2008-03-13 13:11:43 -07:00