[PATCH] SELinux: fix bug in Netlink message type detection
This patch fixes a bug in the SELinux Netlink message type detection code, where the wrong constant was being used in a case statement. The incorrect value is not valid for this class of object so it would not have been reached, and fallen through to a default handler for all Netlink messages. Signed-off-by: James Morris <jmorris@redhat.com> Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
This commit is contained in:
Родитель
1db7fc75a4
Коммит
388c69789a
|
@ -126,7 +126,7 @@ int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm)
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case SECCLASS_NETLINK_FIREWALL_SOCKET:
|
case SECCLASS_NETLINK_FIREWALL_SOCKET:
|
||||||
case NETLINK_IP6_FW:
|
case SECCLASS_NETLINK_IP6FW_SOCKET:
|
||||||
err = nlmsg_perm(nlmsg_type, perm, nlmsg_firewall_perms,
|
err = nlmsg_perm(nlmsg_type, perm, nlmsg_firewall_perms,
|
||||||
sizeof(nlmsg_firewall_perms));
|
sizeof(nlmsg_firewall_perms));
|
||||||
break;
|
break;
|
||||||
|
|
Загрузка…
Ссылка в новой задаче