--- /dev/null
+From nobody Mon Sep 17 00:00:00 2001
+From: Serge E. Hallyn <serue@us.ibm.com>
+Date: Mon, 15 May 2006 09:43:48 -0700
+Subject: [PATCH] selinux: check for failed kmalloc in security_sid_to_context()
+
+Check for NULL kmalloc return value before writing to it.
+
+Signed-off-by: Serge E. Hallyn <serue@us.ibm.com>
+Acked-by: James Morris <jmorris@namei.org>
+Cc: Stephen Smalley <sds@tycho.nsa.gov>
+Signed-off-by: Andrew Morton <akpm@osdl.org>
+Signed-off-by: Linus Torvalds <torvalds@osdl.org>
+Signed-off-by: Chris Wright <chrisw@sous-sol.org>
+---
+
+ security/selinux/ss/services.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+--- linux-2.6.16.16.orig/security/selinux/ss/services.c
++++ linux-2.6.16.16/security/selinux/ss/services.c
+@@ -592,6 +592,10 @@ int security_sid_to_context(u32 sid, cha
+
+ *scontext_len = strlen(initial_sid_to_string[sid]) + 1;
+ scontextp = kmalloc(*scontext_len,GFP_ATOMIC);
++ if (!scontextp) {
++ rc = -ENOMEM;
++ goto out;
++ }
+ strcpy(scontextp, initial_sid_to_string[sid]);
+ *scontext = scontextp;
+ goto out;
scx200_acb-fix-resource-name-use-after-free.patch
netfilter-do_add_counters-race-possible-info-leak.patch
tg3-ethtool-always-report-port-is-tp.patch
+selinux-check-for-failed-kmalloc-in-security_sid_to_context.patch