linux/security/integrity/evm
Roberto Sassu 221be106d7 evm: check hash algorithm passed to init_desc()
This patch prevents memory access beyond the evm_tfm array by checking the
validity of the index (hash algorithm) passed to init_desc(). The hash
algorithm can be arbitrarily set if the security.ima xattr type is not
EVM_XATTR_HMAC.

Fixes: 5feeb61183 ("evm: Allow non-SHA1 digital signatures")
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Cc: stable@vger.kernel.org
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
2019-05-29 23:18:25 -04:00
..
evm_crypto.c evm: check hash algorithm passed to init_desc() 2019-05-29 23:18:25 -04:00
evm_main.c evm: remove set but not used variable 'xattr' 2019-02-04 17:36:01 -05:00
evm_posix_acl.c security: audit and remove any unnecessary uses of module.h 2018-12-12 14:58:51 -08:00
evm_secfs.c audit: link integrity evm_write_xattrs record to syscall event 2019-03-27 18:11:52 -04:00
evm.h evm: Allow non-SHA1 digital signatures 2018-07-18 07:27:22 -04:00
Kconfig evm: Allow non-SHA1 digital signatures 2018-07-18 07:27:22 -04:00
Makefile evm: posix acls modify i_mode 2011-09-14 15:24:51 -04:00