Hi James,
A single SELinux fix for 4.4 that corrects a problem with SELinux's
conditional rules handling. The fix is small, easily understood, and passes
the SELinux testsuite. Please pull and send to Linus.
As of a few minutes ago, selinux#upstream applied cleanly on top of linux-
security#next.
Thanks,
-Paul
---
The following changes since commit 63205654c0e05e5ffa1c6eef2fbef21dcabd2185:
selinux: Use a kmem_cache for allocation struct file_security_struct
(2015-10-21 17:44:30 -0400)
are available in the git repository at:
git://git.infradead.org/users/pcmoore/selinux upstream
for you to fetch changes up to f3bef67992e8698897b584616535803887c4a73e:
selinux: fix bug in conditional rules handling (2015-11-24 13:44:32 -0500)
----------------------------------------------------------------
Stephen Smalley (1):
selinux: fix bug in conditional rules handling
security/selinux/ss/conditional.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--
paul moore
security @ redhat
--
To unsubscribe from this list: send the line "unsubscribe
linux-security-module" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html