]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
.29 patch
authorGreg Kroah-Hartman <gregkh@suse.de>
Wed, 29 Apr 2009 20:51:32 +0000 (13:51 -0700)
committerGreg Kroah-Hartman <gregkh@suse.de>
Wed, 29 Apr 2009 20:51:32 +0000 (13:51 -0700)
queue-2.6.29/series
queue-2.6.29/unreached-code-in-selinux_ip_postroute_iptables_compat.patch [new file with mode: 0644]

index f1fa000ea7b60c7789d907ddb61b3b8acd0d5dba..7a2079832d69ac1c258fb027a8a05dc194f00aa6 100644 (file)
@@ -16,3 +16,4 @@ block-include-empty-disks-in-proc-diskstats.patch
 crypto-ixp4xx-fix-handling-of-chained-sg-buffers.patch
 exit_notify-kill-the-wrong-capable-check.patch
 pci-fix-incorrect-mask-of-pm-no_soft_reset-bit.patch
+unreached-code-in-selinux_ip_postroute_iptables_compat.patch
diff --git a/queue-2.6.29/unreached-code-in-selinux_ip_postroute_iptables_compat.patch b/queue-2.6.29/unreached-code-in-selinux_ip_postroute_iptables_compat.patch
new file mode 100644 (file)
index 0000000..758365d
--- /dev/null
@@ -0,0 +1,36 @@
+From eteo@redhat.com  Wed Apr 29 13:47:17 2009
+From: Eugene Teo <eteo@redhat.com>
+Date: Mon, 13 Apr 2009 10:04:41 +0800
+Subject: unreached code in selinux_ip_postroute_iptables_compat() (CVE-2009-1184)
+To: paul.moore@hp.com
+Cc: jmorris@namei.org, greg@kroah.com, chrisw@redhat.com, error27@gmail.com
+Message-ID: <20090413020434.GA29916@kernel.sg>
+
+From: Eugene Teo <eteo@redhat.com>
+
+Not upstream in 2.6.30, as the function was removed there, making this a
+non-issue.
+
+Node and port send checks can skip in the compat_net=1 case. This bug
+was introduced in commit effad8d.
+
+Signed-off-by: Eugene Teo <eugeneteo@kernel.sg>
+Reported-by: Dan Carpenter <error27@gmail.com>
+Acked-by: James Morris <jmorris@namei.org>
+Acked-by: Paul Moore <paul.moore@hp.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ security/selinux/hooks.c |    1 +
+ 1 file changed, 1 insertion(+)
+
+--- a/security/selinux/hooks.c
++++ b/security/selinux/hooks.c
+@@ -4661,6 +4661,7 @@ static int selinux_ip_postroute_iptables
+       if (err)
+               return err;
+       err = avc_has_perm(sk_sid, if_sid, SECCLASS_NETIF, netif_perm, ad);
++      if (err)
+               return err;
+       err = sel_netnode_sid(addrp, family, &node_sid);