diff options
author | Olivier Fourdan <ofourdan@redhat.com> | 2023-12-06 12:09:41 +0100 |
---|---|---|
committer | José Expósito <jose.exposito89@gmail.com> | 2024-01-16 09:58:09 +0100 |
commit | 8d825f72da71d6c38cbb02cf2ee2dd9e0e0f50f2 (patch) | |
tree | 634314c87c63390e6bb92c182d5c098e457d50a5 /include/nonsdk_extinit.h | |
parent | 5c4816afa7722ea47d1a7dea983a953e7b454d26 (diff) |
glx: Call XACE hooks on the GLX buffer
The XSELINUX code will label resources at creation by checking the
access mode. When the access mode is DixCreateAccess, it will call the
function to label the new resource SELinuxLabelResource().
However, GLX buffers do not go through the XACE hooks when created,
hence leaving the resource actually unlabeled.
When, later, the client tries to create another resource using that
drawable (like a GC for example), the XSELINUX code would try to use
the security ID of that object which has never been labeled, get a NULL
pointer and crash when checking whether the requested permissions are
granted for subject security ID.
To avoid the issue, make sure to call the XACE hooks when creating the
GLX buffers.
Credit goes to Donn Seeley <donn@xmission.com> for providing the patch.
CVE-2024-0408
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Acked-by: Peter Hutterer <peter.hutterer@who-t.net>
(cherry picked from commit e5e8586a12a3ec915673edffa10dc8fe5e15dac3)
Diffstat (limited to 'include/nonsdk_extinit.h')
0 files changed, 0 insertions, 0 deletions