linux/security/selinux
Paul Moore e1770d97a7 [SELinux]: Fix double free in selinux_netlbl_sock_setsid()
As pointed out by Adrian Bunk, commit
45c950e0f8 ("fix memory leak in netlabel
code") caused a double-free when security_netlbl_sid_to_secattr()
fails.  This patch fixes this by removing the netlbl_secattr_destroy()
call from that function since we are already releasing the secattr
memory in selinux_netlbl_sock_setsid().

Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-01-31 19:27:04 -08:00
..
include SELinux: Allow NetLabel to directly cache SIDs 2008-01-30 08:17:27 +11:00
ss [SELinux]: Fix double free in selinux_netlbl_sock_setsid() 2008-01-31 19:27:04 -08:00
avc.c
exports.c SELinux: Enable dynamic enable/disable of the network access checks 2008-01-30 08:17:26 +11:00
hooks.c selinux: make selinux_set_mnt_opts() static 2008-01-30 08:17:44 +11:00
Kconfig
Makefile
netif.c SELinux: Add warning messages on network denial due to error 2008-01-30 08:17:30 +11:00
netlabel.c SELinux: Allow NetLabel to directly cache SIDs 2008-01-30 08:17:27 +11:00
netlink.c
netnode.c SELinux: Add warning messages on network denial due to error 2008-01-30 08:17:30 +11:00
nlmsgtab.c
selinuxfs.c
xfrm.c SELinux: Enable dynamic enable/disable of the network access checks 2008-01-30 08:17:26 +11:00