Hi Marshall,

Thanks for the reference to the upstream patch.  Unfortunately the
kernel for Jaunty is currently frozen, so this will likely have to wait
for Karmic.  This could likely qualify for a Stable Release Update once
Jaunty is released, but I'll leave that to the discression of the kernel
team.  I've pasted the upstream git commit id below for them to
reference.  Thanks.

ogasaw...@yoji:~/linux-2.6$ git log -p
8b6a5a37f87a414ef8636e36ec75accb27bb7508

commit 8b6a5a37f87a414ef8636e36ec75accb27bb7508

Author: Eric Paris <[email protected]>

Date:   Wed Oct 29 17:06:46 2008 -0400


    SELinux: check open perms in dentry_open not inode_permission


    Some operations, like searching a directory path or connecting a
unix domain

    socket, make explicit calls into inode_permission.  Our choices are
to

    either try to come up with a signature for all of the explicit calls
to

    inode_permission and do not check open on those, or to move the open
checks to

    dentry_open where we know this is always an open operation.  This
patch moves

    the checks to dentry_open.


    Signed-off-by: Eric Paris <[email protected]>

    Acked-by:  Stephen Smalley <[email protected]>

    Signed-off-by: James Morris <[email protected]>

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu)
       Status: New => Triaged

-- 
Warnings about open_file_mask_to_av with unknown mode when SELinux is enabled
https://bugs.launchpad.net/bugs/357041
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to