summaryrefslogtreecommitdiff
path: root/include/nonsdk_extinit.h
diff options
context:
space:
mode:
authorOlivier Fourdan <ofourdan@redhat.com>2023-12-06 12:09:41 +0100
committerJosé Expósito <jose.exposito89@gmail.com>2024-01-16 09:58:09 +0100
commit8d825f72da71d6c38cbb02cf2ee2dd9e0e0f50f2 (patch)
tree634314c87c63390e6bb92c182d5c098e457d50a5 /include/nonsdk_extinit.h
parent5c4816afa7722ea47d1a7dea983a953e7b454d26 (diff)
glx: Call XACE hooks on the GLX buffer
The XSELINUX code will label resources at creation by checking the access mode. When the access mode is DixCreateAccess, it will call the function to label the new resource SELinuxLabelResource(). However, GLX buffers do not go through the XACE hooks when created, hence leaving the resource actually unlabeled. When, later, the client tries to create another resource using that drawable (like a GC for example), the XSELINUX code would try to use the security ID of that object which has never been labeled, get a NULL pointer and crash when checking whether the requested permissions are granted for subject security ID. To avoid the issue, make sure to call the XACE hooks when creating the GLX buffers. Credit goes to Donn Seeley <donn@xmission.com> for providing the patch. CVE-2024-0408 Signed-off-by: Olivier Fourdan <ofourdan@redhat.com> Acked-by: Peter Hutterer <peter.hutterer@who-t.net> (cherry picked from commit e5e8586a12a3ec915673edffa10dc8fe5e15dac3)
Diffstat (limited to 'include/nonsdk_extinit.h')
0 files changed, 0 insertions, 0 deletions