[PATCH] SELinux: fix bug in Netlink message type detection
From: James Morris
Date: Tue Apr 05 2005 - 10:27:48 EST
This patch fixes a bug in the SELinux Netlink message type detection code,
where the wrong constant was being used in a case statement. The incorrect
value is not valid for this class of object so it would not have been reached,
and fallen through to a default handler for all Netlink messages.
Please apply.
Signed-off-by: James Morris <jmorris@xxxxxxxxxx>
Signed-off-by: Stephen Smalley <sds@xxxxxxxxxxxxx>
---
security/selinux/nlmsgtab.c | 2 +-
1 files changed, 1 insertion(+), 1 deletion(-)
diff -urN -X dontdiff linux-2.6.12-rc1-mm4.o/security/selinux/nlmsgtab.c linux-2.6.12-rc1-mm4.w/security/selinux/nlmsgtab.c
--- linux-2.6.12-rc1-mm4.o/security/selinux/nlmsgtab.c 2005-03-15 19:17:05.000000000 -0500
+++ linux-2.6.12-rc1-mm4.w/security/selinux/nlmsgtab.c 2005-04-04 18:57:55.000000000 -0400
@@ -126,7 +126,7 @@
break;
case SECCLASS_NETLINK_FIREWALL_SOCKET:
- case NETLINK_IP6_FW:
+ case SECCLASS_NETLINK_IP6FW_SOCKET:
err = nlmsg_perm(nlmsg_type, perm, nlmsg_firewall_perms,
sizeof(nlmsg_firewall_perms));
break;
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/