Red Hat Bugzilla – Bug 488196
kernel: selinux: selinux_netlbl_inode_permission() null pointer deref
Last modified: 2016-03-04 06:10:43 EST
Description of problem:
Rick McNeal from LSI identified a panic in selinux_netlbl_inode_permission() caused by a certain sequence of SUNRPC operations. The problem appears to be due to the lack of NULL pointer checking in the function; the patch for this issue adds the pointer checks so the function will exit safely in the cases where the socket is not completely initialized.
Created attachment 333839 [details]
It appears that the problem is caused by the test case/out of tree code. The problem is not in the selinux or the netlabel code. Closing bugs.