[PATCH][SELINUX] Fix compute_av bug
From: Stephen Smalley
Date: Fri Mar 12 2004 - 14:29:03 EST
This patch fixes a bug in the SELinux compute_av code; the current code
yields the right access computation but can cause unnecessary (but
harmless) processing to occur when transition permission wasn't granted
in the first place by the TE configuration. Thanks to Chad Hanson of
TCS for reporting the bug.
security/selinux/ss/services.c | 2 +-
1 files changed, 1 insertion(+), 1 deletion(-)
Index: linux-2.6/security/selinux/ss/services.c
===================================================================
RCS file: /nfshome/pal/CVS/linux-2.6/security/selinux/ss/services.c,v
retrieving revision 1.34
diff -u -r1.34 services.c
--- linux-2.6/security/selinux/ss/services.c 18 Feb 2004 14:26:06 -0000 1.34
+++ linux-2.6/security/selinux/ss/services.c 12 Mar 2004 13:37:44 -0000
@@ -262,7 +262,7 @@
* pair.
*/
if (tclass == SECCLASS_PROCESS &&
- avd->allowed && PROCESS__TRANSITION &&
+ (avd->allowed & PROCESS__TRANSITION) &&
scontext->role != tcontext->role) {
for (ra = policydb.role_allow; ra; ra = ra->next) {
if (scontext->role == ra->role &&
--
Stephen Smalley <sds@xxxxxxxxxxxxxx>
National Security Agency
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/