]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
unreached code in selinux_ip_postroute_iptables_compat() (CVE-2009-1184)
authorEugene Teo <eteo@redhat.com>
Mon, 13 Apr 2009 02:04:41 +0000 (10:04 +0800)
committerGreg Kroah-Hartman <gregkh@suse.de>
Sat, 2 May 2009 17:57:21 +0000 (10:57 -0700)
Not upstream in 2.6.30, as the function was removed there, making this a
non-issue.

Node and port send checks can skip in the compat_net=1 case. This bug
was introduced in commit effad8d.

Signed-off-by: Eugene Teo <eugeneteo@kernel.sg>
Reported-by: Dan Carpenter <error27@gmail.com>
Acked-by: James Morris <jmorris@namei.org>
Acked-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
security/selinux/hooks.c

index f85597a4d733f06d89e69987cf48f02606bb2d27..d9a5adc3986ce12efad1e51d7b1c62541d1ce016 100644 (file)
@@ -4550,6 +4550,7 @@ static int selinux_ip_postroute_iptables_compat(struct sock *sk,
        if (err)
                return err;
        err = avc_has_perm(sk_sid, if_sid, SECCLASS_NETIF, netif_perm, ad);
+       if (err)
                return err;
 
        err = sel_netnode_sid(addrp, family, &node_sid);