libvirt/src/security
Christian Ehrhardt a150b86c4c virt-aa-helper: apparmor wildcards to forbidden chars
Some globbing chars in the domain name could be used to break out of
apparmor rules, so lets forbid these when in virt-aa-helper.

Also adding a test to ensure all those cases were detected as bad char.

Signed-off-by: Christian Ehrhardt <christian.ehrhardt@canonical.com>
2017-10-27 10:32:02 +02:00
..
security_apparmor.c apparmor: delete profile on VM shutdown 2017-09-22 12:32:49 +02:00
security_apparmor.h
security_dac.c util: storagefile: Add helpers to check presence of backing store 2017-10-17 06:19:18 +02:00
security_dac.h security: add MANAGER_MOUNT_NAMESPACE flag 2017-09-12 12:27:42 -04:00
security_driver.c
security_driver.h security: don't relabel chardev source if virtlogd is used as stdio handler 2017-06-16 16:00:10 +02:00
security_manager.c Print hex values with '0x' prefix and octal with '0' in debug messages 2017-09-25 13:34:53 +01:00
security_manager.h security: add MANAGER_MOUNT_NAMESPACE flag 2017-09-12 12:27:42 -04:00
security_nop.c security: don't relabel chardev source if virtlogd is used as stdio handler 2017-06-16 16:00:10 +02:00
security_nop.h
security_selinux.c util: storagefile: Add helpers to check presence of backing store 2017-10-17 06:19:18 +02:00
security_selinux.h
security_stack.c security: don't relabel chardev source if virtlogd is used as stdio handler 2017-06-16 16:00:10 +02:00
security_stack.h
virt-aa-helper.c virt-aa-helper: apparmor wildcards to forbidden chars 2017-10-27 10:32:02 +02:00