diff options
author | David Woodhouse <dwmw2@infradead.org> | 2006-09-29 18:50:25 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-09-29 18:58:21 -0400 |
commit | 2148ccc437a9eac9f0d4b3c27cb1e41f6a48194c (patch) | |
tree | 03dc59734526aa654d29e1b81cdad18369598182 | |
parent | 9a69d1aeccf169d9a1e442c07d3a6e87f06a7b49 (diff) |
[PATCH] MLSXFRM: fix mis-labelling of child sockets
Accepted connections of types other than AF_INET, AF_INET6, AF_UNIX won't
have an appropriate label derived from the peer, so don't use it.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: James Morris <jmorris@namei.org>
Acked-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
-rw-r--r-- | security/selinux/hooks.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index cac0273ec447..e9969a2fc846 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -3619,7 +3619,9 @@ static void selinux_sock_graft(struct sock* sk, struct socket *parent) | |||
3619 | struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; | 3619 | struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; |
3620 | struct sk_security_struct *sksec = sk->sk_security; | 3620 | struct sk_security_struct *sksec = sk->sk_security; |
3621 | 3621 | ||
3622 | isec->sid = sksec->sid; | 3622 | if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6 || |
3623 | sk->sk_family == PF_UNIX) | ||
3624 | isec->sid = sksec->sid; | ||
3623 | 3625 | ||
3624 | selinux_netlbl_sock_graft(sk, parent); | 3626 | selinux_netlbl_sock_graft(sk, parent); |
3625 | } | 3627 | } |